//]]>
Information Technology Convergence, Secure and Trust Computing, and Data Management by Park, Jong Hyuk (James). Publication: . XXXII, 296 p. 131 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Proceedings of the International Conference on IT Convergence and Security 2011 by Kim, Kuinam J. Publication: . XIV, 642 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Trends for FPGAS by Badrignans, Benoit. Publication: . XX, 252p. 85 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Machine Learning and Systems Engineering by Ao, Sio-Iong. Publication: . XXII, 614 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
IT Security Management by Partida, Alberto. Publication: . XXXV, 247p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthy Internet by Salgarelli, Luca. Publication: . XVIII, 369p. 84 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
ISSE 2010 Securing Electronic Business Processes by Pohlmann, Norbert. Publication: . XII, 416 p. 80 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Wireless Networks and Security by Khan, Shafiullah. Publication: . VIII, 512 p. 163 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Handbook of Information and Communication Security by Stavroulakis, Peter. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced DPA Theory and Practice by Peeters, Eric. Publication: . XVI, 139 p. 70 illus., 20 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Physical Unclonable Functions in Theory and Practice by Böhm, Christoph. Publication: . XVIII, 270 p. 217 illus., 146 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
PBX Security and Forensics by Androulidakis, Iosif I. Publication: . XX, 115 p. 85 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mobile Phone Security and Forensics by Androulidakis, Iosif I. Publication: . XI, 103 p. 39 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security in Embedded Devices by Gebotys, Catherine H. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Secure Integrated Circuits and Systems by Verbauwhede, Ingrid M.R. Publication: . X, 246p. 92 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Internet and Distributed Computing Systems by Pathan, Mukaddim. Publication: . XI, 400 p. 179 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Trust Management by Accorsi, Rafael. Publication: . X, 235 p. 53 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
On the Move to Meaningful Internet Systems: OTM 2013 Conferences by Meersman, Robert. Publication: . XXX, 775 p. 269 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Safety, Reliability, and Security by Bitsch, Friedemann. Publication: . XVI, 304 p. 109 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented and Cloud Computing by Lau, Kung-Kiu. Publication: . X, 244 p. 80 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 4 5 Next >>

Languages: 
English |
العربية