//]]>
Intelligence and security informatics for international security : , Information sharing and data mining / by Chen, Hsinchum Publication: New York : Springer, 2006 . xvii, 182 p. : Date:2006 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Technology Convergence, Secure and Trust Computing, and Data Management by Park, Jong Hyuk (James). Publication: . XXXII, 296 p. 131 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Future Information Technology, Application, and Service by J. (Jong Hyuk) Park, James. Publication: . LV, 768 p. 356 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
IT Security Management by Partida, Alberto. Publication: . XXXV, 247p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multimedia Processing, Communication and Computing Applications by Swamy, Punitha P. Publication: . XXXV, 345 p. 185 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Handbook of Information and Communication Security by Stavroulakis, Peter. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Handbook of Signal Processing Systems by Bhattacharyya, Shuvra S. Publication: . XXI, 1399 p. 708 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced DPA Theory and Practice by Peeters, Eric. Publication: . XVI, 139 p. 70 illus., 20 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Physical Unclonable Functions in Theory and Practice by Böhm, Christoph. Publication: . XVIII, 270 p. 217 illus., 146 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Handbook of Signal Processing Systems by Bhattacharyya, Shuvra S. Publication: . XXXVIII, 1117p. 100 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Secure Integrated Circuits and Systems by Verbauwhede, Ingrid M.R. Publication: . X, 246p. 92 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Data Mining and Applications by Motoda, Hiroshi. Publication: . XXII, 538 p. 163 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptography and Coding by Stam, Martijn. Publication: . XII, 365 p. 39 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Systems Security by Bagchi, Aditya. Publication: . XVI, 404 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Middleware 2013 by Eyers, David. Publication: . XV, 498 p. 238 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology - ASIACRYPT 2013 by Sako, Kazue. Publication: . XXIV, 542 p. 58 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology - ASIACRYPT 2013 by Sako, Kazue. Publication: . XXIV, 546 p. 82 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Number Theory and Cryptography by Fischlin, Marc. Publication: . XII, 281 p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Conceptual Modeling by Ng, Wilfred. Publication: . XXVIII, 514 p. 165 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols XXI by Christianson, Bruce. Publication: . X, 267 p. 23 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 4 5 6 7 8 9 10 Next >>

Languages: 
English |
العربية