//]]>
IT Security Management by Partida, Alberto. Publication: . XXXV, 247p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthy Internet by Salgarelli, Luca. Publication: . XVIII, 369p. 84 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Systems Security by Bagchi, Aditya. Publication: . XVI, 404 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols XXI by Christianson, Bruce. Publication: . X, 267 p. 23 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Information Infrastructures Security by Hämmerli, Bernhard M. Publication: . XIV, 277 p. 103 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Information Infrastructure Security by Bologna, Sandro. Publication: . XII, 227 p. 56 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Internet and Distributed Computing Systems by Pathan, Mukaddim. Publication: . XI, 400 p. 179 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Information and Computer Security by Sakiyama, Kazuo. Publication: . XII, 319 p. 53 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Research in Attacks, Intrusions, and Defenses by Stolfo, Salvatore J. Publication: . XII, 476 p. 139 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security, Privacy, and Applied Cryptography Engineering by Gierlichs, Benedikt. Publication: . XIV, 191 p. 35 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Safety, Reliability, and Security by Bitsch, Friedemann. Publication: . XVI, 304 p. 109 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Communications and Multimedia Security by Decker, Bart. Publication: . XIV, 249 p. 83 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Communication Networking by Bauschert, Thomas. Publication: . XII, 322 p. 135 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Lightweight Cryptography for Security and Privacy by Avoine, Gildas. Publication: . X, 143 p. 24 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Security – ESORICS 2013 by Crampton, Jason. Publication: . XVIII, 794 p. 158 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Constructive Side-Channel Analysis and Secure Design by Prouff, Emmanuel. Publication: . X, 215 p. 51 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Infrastructures, Services and Applications by Capitani di Vimercati, Sabrina. Publication: . X, 195 p. 30 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligence and Security Informatics by Wang, G. Alan. Publication: . X, 117 p. 41 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data and Applications Security and Privacy XXVII by Wang, Lingyu. Publication: . XIV, 305 p. 71 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Detection of Intrusions and Malware, and Vulnerability Assessment by Rieck, Konrad. Publication: . XII, 207 p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 4 5 6 7 8 9 10 Next >>

Languages: 
English |
العربية