//]]>
Information assurance architecture / by Willett, Keith D. Publication: Boca Raton, FL : CRC Press, 2008 . xxix, 588 p. : 25 cm. Date:2008 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
Encyclopedia of information assurance /   Publication: Boca Raton, FL : Auerbach Publications, 2011 . 4 v. (xlviii, 3192, I-117 p.) : 29 cm. Date:2011 Availability: Copies available: AUM Main Library (8),
Actions: Add to Cart
Information Technology Convergence, Secure and Trust Computing, and Data Management by Park, Jong Hyuk (James). Publication: . XXXII, 296 p. 131 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Proceedings of the International Conference on IT Convergence and Security 2011 by Kim, Kuinam J. Publication: . XIV, 642 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Trends for FPGAS by Badrignans, Benoit. Publication: . XX, 252p. 85 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Machine Learning and Systems Engineering by Ao, Sio-Iong. Publication: . XXII, 614 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
IT Security Management by Partida, Alberto. Publication: . XXXV, 247p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthy Internet by Salgarelli, Luca. Publication: . XVIII, 369p. 84 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
ISSE 2010 Securing Electronic Business Processes by Pohlmann, Norbert. Publication: . XII, 416 p. 80 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Wireless Networks and Security by Khan, Shafiullah. Publication: . VIII, 512 p. 163 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Handbook of Information and Communication Security by Stavroulakis, Peter. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced DPA Theory and Practice by Peeters, Eric. Publication: . XVI, 139 p. 70 illus., 20 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Physical Unclonable Functions in Theory and Practice by Böhm, Christoph. Publication: . XVIII, 270 p. 217 illus., 146 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
PBX Security and Forensics by Androulidakis, Iosif I. Publication: . XX, 115 p. 85 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mobile Phone Security and Forensics by Androulidakis, Iosif I. Publication: . XI, 103 p. 39 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security in Embedded Devices by Gebotys, Catherine H. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Secure Integrated Circuits and Systems by Verbauwhede, Ingrid M.R. Publication: . X, 246p. 92 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptography and Coding by Stam, Martijn. Publication: . XII, 365 p. 39 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Systems Security by Bagchi, Aditya. Publication: . XVI, 404 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology - ASIACRYPT 2013 by Sako, Kazue. Publication: . XXIV, 542 p. 58 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 4 5 6 7 8 9 10 Next >>

Languages: 
English |
العربية