//]]>
Financial Cryptography and Data Security by Sadeghi, Ahmad-Reza. Publication: . XVI, 406 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Aided Verification by Sharygina, Natasha. Publication: . XXII, 1015 p. 237 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligence and Security Informatics by Wang, G. Alan. Publication: . X, 117 p. 41 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Science and Its Applications – ICCSA 2013 by Murgante, Beniamino. Publication: . XXXVI, 679 p. 276 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Science and Its Applications – ICCSA 2013 by Murgante, Beniamino. Publication: . XXXVI, 729 p. 317 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Interactive Theorem Proving by Blazy, Sandrine. Publication: . XII, 498 p. 73 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligent Computing Theories and Technology by Huang, De-Shuang. Publication: . XXIV, 693 p. 268 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligent Computing Theories by Huang, De-Shuang. Publication: . XXII, 651 p. 256 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Human Aspects of Information Security, Privacy, and Trust by Marinos, Louis. Publication: . XX, 378 p. 102 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data and Applications Security and Privacy XXVII by Wang, Lingyu. Publication: . XIV, 305 p. 71 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Detection of Intrusions and Malware, and Vulnerability Assessment by Rieck, Konrad. Publication: . XII, 207 p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
E-Voting and Identify by Heather, James. Publication: . X, 211 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy Enhancing Technologies by Cristofaro, Emiliano. Publication: . X, 265 p. 88 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Boyd, Colin. Publication: . XII, 437 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Emerging Management Mechanisms for the Future Internet by Doyen, Guillaume. Publication: . XVI, 161 p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Cryptography and Network Security by Jacobson, Michael. Publication: . XIV, 572 p. 115 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network and System Security by Lopez, Javier. Publication: . XX, 793 p. 207 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Post-Quantum Cryptography by Gaborit, Philippe. Publication: . X, 259 p. 17 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web-Age Information Management by Wang, Jianyong. Publication: . XXVIII, 812 p. 326 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – AFRICACRYPT 2013 by Youssef, Amr. Publication: . XIV, 453 p. 33 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية