//]]>
Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices by Samarati, Pierangela. Publication: . XIII, 386p. 93 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Topics in Cryptology - CT-RSA 2010 by Pieprzyk, Josef. Publication: . 397p. 43 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Cryptography by Micciancio, Daniele. Publication: . 607p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Computing and Networking by Kant, Krishna. Publication: . XIX, 522p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Privacy Management and Autonomous Spontaneous Security by Garcia-Alfaro, Joaquin. Publication: . XII, 265p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cyberspace Safety and Security by Wang, Guojun. Publication: . XXVI, 480 p. 149 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – INDOCRYPT 2013 by Paul, Goutam. Publication: . XVIII, 319 p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trusted Systems by Bloem, Roderick. Publication: . XII, 103 p. 18 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptology and Network Security by Abdalla, Michel. Publication: . XVIII, 349 p. 52 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information and Communications Security by Qing, Sihan. Publication: . XIV, 414 p. 94 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Crittografia nel Paese delle Meraviglie by Venturi, Daniele. Publication: . XIV, 500 pagg. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy Preserving in Social Networks by Chbeir, Richard. Publication: . XVI, 367 p. 107 illus., 66 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Digital Forensics IX by Peterson, Gilbert. Publication: . XX, 398 p. 92 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust Management VII by Fernández-Gago, Carmen. Publication: . XII, 289 p. 49 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Quality, Reliability, Security and Robustness in Heterogeneous Networks by Singh, Karan. Publication: . XVIII, 1011 p. 488 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Policies and Research in Identity Management by Fischer-Hübner, Simone. Publication: . X, 161 p. 34 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ad Hoc Networks by Zheng, Jun. Publication: . XII, 366 p. 168 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy in Communication Networks by Keromytis, Angelos D. Publication: . X, 369 p. 111 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthy Computing and Services by Yuan, Yuyu. Publication: . XVIII, 739 p. 301 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Recent Trends in Computer Networks and Distributed Systems Security by Thampi, Sabu M. Publication: . XXI, 508 p. 207 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية