//]]>
Service-Oriented and Cloud Computing by Paoli, Flavio. Publication: . XI, 282 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security by Gollmann, Dieter. Publication: . XIV, 402 p. 87 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Research in Attacks, Intrusions, and Defenses by Balzarotti, Davide. Publication: . XIV, 400 p. 119 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Provable Security by Takagi, Tsuyoshi. Publication: . XIII, 337 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Security – ESORICS 2012 by Foresti, Sara. Publication: . XVII, 896 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptographic Hardware and Embedded Systems – CHES 2012 by Prouff, Emmanuel. Publication: . XVII, 562 p. 189 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Keromytis, Angelos D. Publication: . XI, 416 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Cryptography for Networks by Visconti, Ivan. Publication: . XI, 582 p. 75 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Secure Data Management by Jonker, Willem. Publication: . X, 177 p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information and Communication Technologies by Szabó, Róbert. Publication: . X, 450 p. 164 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Communications and Multimedia Security by Decker, Bart. Publication: . VIII, 239 p. 57 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
E-Voting and Identity by Kiayias, Aggelos. Publication: . X, 257 p. 26 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Convergence and Hybrid Information Technology by Lee, Geuk. Publication: . XX, 763 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multidisciplinary Research and Practice for Information Systems by Quirchmayr, Gerald. Publication: . XV, 683 p. 235 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Business System Management and Engineering by Ardagna, Claudio A. Publication: . X, 197 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Interactive Theorem Proving by Beringer, Lennart. Publication: . XI, 419 p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trusted Systems by Chen, Liqun. Publication: . XII, 351 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust, Privacy and Security in Digital Business by Fischer-Hübner, Simone. Publication: . XI, 242 p. 82 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Theoretic Security by Smith, Adam. Publication: . XI, 219 p. 28 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web-Age Information Management by Gao, Hong. Publication: . XV, 486p. 227 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية