//]]>
Information, Security and Cryptology – ICISC 2009 by Lee, Donghoon. Publication: . XIII, 387p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Information Infrastructures Security by Rome, Erich. Publication: . XII, 213p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Data Hiding and Multimedia Security V by Shi, Yun Q. Publication: . XI, 129p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Detection of Intrusions and Malware, and Vulnerability Assessment by Kreibich, Christian. Publication: . XII, 219p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Steinfeld, Ron. Publication: . XII, 403p. 40 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Networked Services and Applications - Engineering, Control and Management by Aagesen, Finn Arve. Publication: . XIII, 275p. 125 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust and Trustworthy Computing by Acquisti, Alessandro. Publication: . XIII, 441p. 84 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fast Software Encryption by Hong, Seokhie. Publication: . XI, 385p. 71 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Arithmetic of Finite Fields by Hasan, M. Anwar. Publication: . 280p. 41 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data and Applications Security and Privacy XXIV by Foresti, Sara. Publication: . XIII, 376p. 80 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Cryptography and Network Security by Zhou, Jianying. Publication: . XIII, 564p. 83 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligence and Security Informatics by Chen, Hsinchun. Publication: . 183p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Architecting Critical Systems by Giese, Holger. Publication: . 205p. 82 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Communications and Multimedia Security by Decker, Bart. Publication: . XIII, 281p. 74 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – EUROCRYPT 2010 by Gilbert, Henri. Publication: . XIV, 694p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Cryptography – PKC 2010 by Nguyen, Phong Q. Publication: . XIII, 519p. 34 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Towards Trustworthy Elections by Chaum, David. Publication: . VIII, 403p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
NETWORKING 2010 by Crovella, Mark. Publication: . XVI, 410p. 181 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Post-Quantum Cryptography by Sendrier, Nicolas. Publication: . X, 241p. 27 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security, Practice and Experience by Kwak, Jin. Publication: . XIII, 399p. 68 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية