//]]>
Information assurance architecture / by Willett, Keith D. Publication: Boca Raton, FL : CRC Press, 2008 . xxix, 588 p. : 25 cm. Date:2008 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
Enterprise information security and privacy /   Publication: Boston, MA : Artech House, 2009 . xxiv, 231 p. : Date:2009 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
Radio Frequency Identification by Hutter, Michael. Publication: . XIV, 177 p. 59 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Adams, Andrew A. Publication: . XII, 239 p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Research in Attacks, Intrusions, and Defenses by Stolfo, Salvatore J. Publication: . XII, 476 p. 139 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Provable Security by Susilo, Willy. Publication: . X, 347 p. 36 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Communications and Multimedia Security by Decker, Bart. Publication: . XIV, 249 p. 83 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented and Cloud Computing by Lau, Kung-Kiu. Publication: . X, 244 p. 80 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Availability, Reliability, and Security in Information Systems and HCI by Cuzzocrea, Alfredo. Publication: . XVI, 504 p. 156 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Security – ESORICS 2013 by Crampton, Jason. Publication: . XVIII, 794 p. 158 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Sadeghi, Ahmad-Reza. Publication: . XVI, 406 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Human Aspects of Information Security, Privacy, and Trust by Marinos, Louis. Publication: . XX, 378 p. 102 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Detection of Intrusions and Malware, and Vulnerability Assessment by Rieck, Konrad. Publication: . XII, 207 p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Boyd, Colin. Publication: . XII, 437 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network and System Security by Lopez, Javier. Publication: . XX, 793 p. 207 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Detection of Intrusions and Malware, and Vulnerability Assessment by Flegel, Ulrich. Publication: . X, 243 p. 86 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Principles of Security and Trust by Basin, David. Publication: . XX, 287 p. 34 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public-Key Cryptography – PKC 2013 by Kurosawa, Kaoru. Publication: . XIV, 518 p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Radio Frequency Identification. Security and Privacy Issues by Hoepman, Jaap-Henk. Publication: . X, 181 p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Topics in Cryptology – CT-RSA 2013 by Dawson, Ed. Publication: . XIV, 405 p. 68 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 Next >>

Languages: 
English |
العربية