//]]>
Critical Infrastructure Protection VII by Butts, Jonathan. Publication: . XVI, 227 p. 68 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Open Source Software: Quality Verification by Petrinja, Etiel. Publication: . XIV, 277 p. 67 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multimedia Communications, Services and Security by Dziech, Andrzej. Publication: . XIV, 325 p. 139 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Infrastructure Protection VI by Butts, Jonathan. Publication: . XVI, 233 p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Auditing and GRC Automation in SAP by Chuprunov, Maxim. Publication: . XXXII, 525 p. 273 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Future Security by Aschenbruck, Nils. Publication: . Approx. 530 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Auctions, Market Mechanisms, and Their Applications by Coles, Peter. Publication: . XII, 113 p. 16 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Digital Forensics VII by Peterson, Gilbert. Publication: . XVIII, 290 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Forensics in Telecommunications, Information, and Multimedia by Lai, Xuejia. Publication: . XIII, 314p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Digital Forensics and Cyber Crime by Baggili, Ibrahim. Publication: . X, 157p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Current Challenges in Patent Information Retrieval by Lupu, Mihai. Publication: . XIV, 418 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Digital Forensics VI by Chow, Kam-Pui. Publication: . XVIII, 311p. 76 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Digital Forensics and Cyber Crime by Goel, Sanjay. Publication: . XII, 171p. 74 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Patent Law for Computer Scientists by Closa, Daniel. Publication: . XV, 194p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Indian Mujahideen by Subrahmanian, V.S. Publication: . XVIII, 173 p. 22 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Digital Legacy and Interaction by Maciel, Cristiano. Publication: . XIV, 144 p. 4 illus., 3 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Security Breaches and Privacy in Europe by Wong, Rebecca. Publication: . VII, 54 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Countering Brandjacking in the Digital Age by Hofman, Christopher. Publication: . VIII, 87 p. 18 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy in Biometrics by Campisi, Patrizio. Publication: . X, 438 p. 114 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Disclosure of Security Vulnerabilities by Maurushat, Alana. Publication: . X, 121 p. 4 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية