//]]>
Advances in Cryptology – EUROCRYPT 2013 by Johansson, Thomas. Publication: . XIV, 736 p. 77 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Infocomm Technology by Guyot, Vincent. Publication: . XVI, 358 p. 153 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Practice and Experience by Deng, Robert H. Publication: . XIV, 388 p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Trust Management by Jøsang, Audun. Publication: . X, 321 p. 74 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology – ICISC 2012 by Kwon, Taekyoung. Publication: . XIV, 512 p. 108 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Smart Card Research and Advanced Applications by Mangard, Stefan. Publication: . XII, 297 p. 98 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Principles of Security and Trust by Basin, David. Publication: . XX, 287 p. 34 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information and Communication Technology by Mustofa, Khabib. Publication: . XVI, 552 p. 170 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Cryptography by Sahai, Amit. Publication: . XII, 726 p. 34 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Engineering Secure Software and Systems by Jürjens, Jan. Publication: . XII, 231 p. 40 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Hiding by Kirchner, Matthias. Publication: . X, 285 p. 100 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public-Key Cryptography – PKC 2013 by Kurosawa, Kaoru. Publication: . XIV, 518 p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Pairing-Based Cryptography – Pairing 2012 by Abdalla, Michel. Publication: . XVI, 333 p. 18 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols XVII by Christianson, Bruce. Publication: . X, 367 p. 28 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Radio Frequency Identification. Security and Privacy Issues by Hoepman, Jaap-Henk. Publication: . X, 181 p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Topics in Cryptology – CT-RSA 2013 by Dawson, Ed. Publication: . XIV, 405 p. 68 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Selected Areas in Cryptography by Knudsen, Lars R. Publication: . XIV, 407 p. 61 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Privacy Management and Autonomous Spontaneous Security by Pietro, Roberto. Publication: . XIV, 333 p. 100 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols XX by Christianson, Bruce. Publication: . X, 277 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Applications by Lee, Dong Hoon. Publication: . XII, 371 p. 135 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية