//]]>
Computer Security – ESORICS 2013 by Crampton, Jason. Publication: . XVIII, 794 p. 158 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Systems Security by Jajodia, Sushil. Publication: . XV, 388 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data and Applications Security and Privacy XXIV by Foresti, Sara. Publication: . XIII, 376p. 80 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy in Communication Networks by Jajodia, Sushil. Publication: . XIII, 500p. 160 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Moving Target Defense II by Jajodia, Sushil. Publication: . XII, 203 p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Moving Target Defense by Jajodia, Sushil. Publication: . XVI, 184 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Encyclopedia of Cryptography and Security by van Tilborg, Henk C. A. Publication: . XL, 1435p. eReference. In 2 volumes, not available separately. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cyber Situational Awareness by Jajodia, Sushil. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data and applications security XIX : , 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005 : proceedings /   Publication: Berlin : Springer, 2005 . x, 352 p. : 24 cm. Date:2005 Availability: Copies available: AUM Main Library (3),
Actions: Add to Cart

Languages: 
English |
العربية