//]]>
Security and Trust Management by Jøsang, Audun. Publication: . X, 321 p. 74 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Health Information Science by Huang, Guangyan. Publication: . XIV, 280 p. 92 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented Computing - ICSOC 2012 Workshops by Ghose, Aditya. Publication: . XVI, 466 p. 153 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology – ICISC 2012 by Kwon, Taekyoung. Publication: . XIV, 512 p. 108 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web Technologies and Applications by Ishikawa, Yoshiharu. Publication: . XXVI, 845 p. 375 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Detection of Intrusions and Malware, and Vulnerability Assessment by Flegel, Ulrich. Publication: . X, 243 p. 86 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Smart Card Research and Advanced Applications by Mangard, Stefan. Publication: . XII, 297 p. 98 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Foundations and Practice of Security by Garcia-Alfaro, Joaquin. Publication: . XIV, 383 p. 90 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fundamental Approaches to Software Engineering by Cortellessa, Vittorio. Publication: . XX, 376 p. 90 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Pervasive Computing and the Networked World by Zu, Qiaohong. Publication: . XXII, 921 p. 434 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Principles of Security and Trust by Basin, David. Publication: . XX, 287 p. 34 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information and Communication Technology by Mustofa, Khabib. Publication: . XVI, 552 p. 170 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Cryptography by Sahai, Amit. Publication: . XII, 726 p. 34 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Engineering Secure Software and Systems by Jürjens, Jan. Publication: . XII, 231 p. 40 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligent Information and Database Systems by Selamat, Ali. Publication: . XXIV, 520 p. 156 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Passive and Active Measurement by Roughan, Matthew. Publication: . XII, 282 p. 135 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Hiding by Kirchner, Matthias. Publication: . X, 285 p. 100 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public-Key Cryptography – PKC 2013 by Kurosawa, Kaoru. Publication: . XIV, 518 p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Pairing-Based Cryptography – Pairing 2012 by Abdalla, Michel. Publication: . XVI, 333 p. 18 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols XVII by Christianson, Bruce. Publication: . X, 367 p. 28 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية