//]]>
Wired/Wireless Internet Communications by Osipov, Evgeny. Publication: . X, 400p. 198 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – EUROCRYPT 2010 by Gilbert, Henri. Publication: . XIV, 694p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Cryptography – PKC 2010 by Nguyen, Phong Q. Publication: . XIII, 519p. 34 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Post-Quantum Cryptography by Sendrier, Nicolas. Publication: . X, 241p. 27 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security, Practice and Experience by Kwak, Jin. Publication: . XIII, 399p. 68 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – AFRICACRYPT 2010 by Bernstein, Daniel J. Publication: . XIII, 437p. 43 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Smart Card Research and Advanced Application by Gollmann, Dieter. Publication: . X, 239p. 78 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Aspects in Security and Trust by Degano, Pierpaolo. Publication: . X, 279p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices by Samarati, Pierangela. Publication: . XIII, 386p. 93 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Topics in Cryptology - CT-RSA 2010 by Pieprzyk, Josef. Publication: . 397p. 43 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Cryptography by Micciancio, Daniele. Publication: . 607p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Computing and Networking by Kant, Krishna. Publication: . XIX, 522p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Privacy Management and Autonomous Spontaneous Security by Garcia-Alfaro, Joaquin. Publication: . XII, 265p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Information Infrastructures Security by Luiijf, Eric. Publication: . XIV, 219 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cyberspace Safety and Security by Wang, Guojun. Publication: . XXVI, 480 p. 149 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Stabilization, Safety, and Security of Distributed Systems by Higashino, Teruo. Publication: . XXIV, 380 p. 86 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptology and Network Security by Abdalla, Michel. Publication: . XVIII, 349 p. 52 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Decision and Game Theory for Security by Das, Sajal K. Publication: . X, 265 p. 57 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthy Ubiquitous Computing by Khalil, Ismail. Publication: . XIX, 267 p. 117 illus., 47 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Frontiers in Internet Technologies by Su, Jinshu. Publication: . XII, 277 p. 132 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية