//]]>
Introduction to Public Key Infrastructures by Buchmann, Johannes A. Publication: . XV, 194 p. 146 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Bluetooth Security Attacks by Haataja, Keijo. Publication: . VII, 93 p. 31 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Assurance and Security Education and Training by Dodge, Ronald C. Publication: . XII, 297 p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Information Security by Basin, David. Publication: . XIV, 202 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Model-Driven Risk Analysis by Lund, Mass Soldal. Publication: . XVI, 460p. 196 illus., 30 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية