//]]>
Security Protocols XXI by Christianson, Bruce. Publication: . X, 267 p. 23 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Provable Security by Susilo, Willy. Publication: . X, 347 p. 36 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – CRYPTO 2013 by Canetti, Ran. Publication: . XVIII, 558 p. 31 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – CRYPTO 2013 by Canetti, Ran. Publication: . XVIII, 590 p. 83 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems by Cavallaro, Lorenzo. Publication: . XVI, 145 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Trust Management by Jøsang, Audun. Publication: . X, 321 p. 74 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Replication by Charron-Bost, Bernadette. Publication: . XV, 290p. 79 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Android Apps Security by Gunasekera, Sheran. Publication: . XVII, 248 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Pro PHP Security by Snyder, Chris. Publication: . XVIII, 368 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية