//]]>
Networks for Pervasive Services by Liotta, Antonio. Publication: . XVIII, 162 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
IT Security Management by Partida, Alberto. Publication: . XXXV, 247p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
QoS Management of Web Services by Zheng, Zibin. Publication: . XII, 150 p. 51 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented Computing by Basu, Samik. Publication: . XVIII, 713 p. 260 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Number Theory and Cryptography by Fischlin, Marc. Publication: . XII, 281 p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Testing Software and Systems by Yenigün, Hüsnü. Publication: . XIV, 291 p. 84 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Measurement Methodology and Tools by Fàbrega, Lluís. Publication: . VIII, 205 p. 96 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security, Privacy, and Applied Cryptography Engineering by Gierlichs, Benedikt. Publication: . XIV, 191 p. 35 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthy Global Computing by Palamidessi, Catuscia. Publication: . X, 213 p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Communications and Multimedia Security by Decker, Bart. Publication: . XIV, 249 p. 83 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Databases and Information Systems by Catania, Barbara. Publication: . XIV, 402 p. 137 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Communication Networking by Bauschert, Thomas. Publication: . XII, 322 p. 135 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Internet of Things, Smart Spaces, and Next Generation Networking by Balandin, Sergey. Publication: . XIV, 440 p. 203 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Security – ESORICS 2013 by Crampton, Jason. Publication: . XVIII, 794 p. 158 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Constructive Side-Channel Analysis and Secure Design by Prouff, Emmanuel. Publication: . X, 215 p. 51 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Infrastructures, Services and Applications by Capitani di Vimercati, Sabrina. Publication: . X, 195 p. 30 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data and Applications Security and Privacy XXVII by Wang, Lingyu. Publication: . XIV, 305 p. 71 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ad-hoc, Mobile, and Wireless Network by Cichoń, Jacek. Publication: . XIV, 329 p. 150 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Detection of Intrusions and Malware, and Vulnerability Assessment by Rieck, Konrad. Publication: . XII, 207 p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy Enhancing Technologies by Cristofaro, Emiliano. Publication: . X, 265 p. 88 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 4 5 6 7 8 9 10 Next >>

Languages: 
English |
العربية