//]]>
Quantum Attacks on Public-Key Cryptosystems by Yan, Song Y. Publication: . VIII, 207 p. 39 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Preserving Privacy in Data Outsourcing by Foresti, Sara. Publication: . XV, 180 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The P=NP Question and Gödel’s Lost Letter by Lipton, Richard J. Publication: . XIII, 239p. 20 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Insider Threats in Cyber Security by Probst, Christian W. Publication: . XII, 244 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Economics of Information Security and Privacy by Moore, Tyler. Publication: . XVI, 320p. 100 illus., 50 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Adaptive Cryptographic Access Control by Kayem, Anne V. D. M. Publication: . XIV, 138 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Association Rule Hiding for Data Mining by Gkoulalas-Divanis, Aris. Publication: . XX, 138p. 120 illus., 60 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Encyclopedia of Cryptography and Security by van Tilborg, Henk C. A. Publication: . XL, 1435p. eReference. In 2 volumes, not available separately. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Genetic Programming Theory and Practice VII by Riolo, Rick. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cyber Situational Awareness by Jajodia, Sushil. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Encryption for Digital Content by Kiayias, Aggelos. Publication: . XIII, 209 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Concise Guide to Computation Theory by Maruoka, Akira. Publication: . XVII, 281p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Proofs and Algorithms by Dowek, Gilles. Publication: . VIII, 195p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Introduction to the Theory of Programming Languages by Dowek, Gilles. Publication: . XI, 118p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Spyware and Adware by Aycock, John. Publication: . XIV, 146 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fundamentals of Speaker Recognition by Beigi, Homayoon. Publication: . LXI, 942p. 177 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Introduction to Biometrics by Jain, Anil K. Publication: . XVI, 312 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network Security by Huang, Scott C.-H. Publication: . XXIII, 300p. 116 illus., 58 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Digital Signatures by Katz, Jonathan. Publication: . XIV, 183p. 8 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Theory and Best Practices in the IT Industry by Mohapatra, Sanjay. Publication: . XV, 216p. 34 illus., 17 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية