//]]>
Information assurance architecture / by Willett, Keith D. Publication: Boca Raton, FL : CRC Press, 2008 . xxix, 588 p. : 25 cm. Date:2008 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
IT security metrics : , a practical framework for measuring security & protecting data / by Hayden, Lance. Publication: New York : McGraw Hill, 2010 . xxvii, 368 p. : 24 cm. Date:2010 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
Encyclopedia of information assurance /   Publication: Boca Raton, FL : Auerbach Publications, 2011 . 4 v. (xlviii, 3192, I-117 p.) : 29 cm. Date:2011 Availability: Copies available: AUM Main Library (8),
Actions: Add to Cart
Steganography in digital media : , principles, algorithms, and applications / by Fridrich, Jessica. Publication: Cambridge : Cambridge University Press, 2010 . xxii, 437 p., [4] p. of plates : 26 cm. Date:2010 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
Security metrics : , a beginner's guide / by Wong, Caroline. Publication: New York : McGraw-Hill, 2012 . xxxii, 397 p. : 24 cm. Date:2012 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
Security in computing / by Pfleeger, Charles P., Publication: Upper Saddle River, N.J : Prentice Hall, 2007 . xxix, 845 p. : 25 cm. Date:2007 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
System assurance : , beyond detecting vulnerabilities / by Mansourov, Nikolai Publication: Amsterdam : Elseiver, 2011 . xix, 346 p. Date:2011 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Enterprise information security and privacy /   Publication: Boston, MA : Artech House, 2009 . xxiv, 231 p. : Date:2009 Availability: Copies available: AUM Main Library (2),
Actions: Add to Cart
Mastering system center data protection manager 2007 / by Ganger, Devin L. Publication: Indianapolis, Ind. : Wiley Pub., 2008 . xxii, 482 p. : 24 cm. Date:2008 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Technology Convergence, Secure and Trust Computing, and Data Management by Park, Jong Hyuk (James). Publication: . XXXII, 296 p. 131 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Proceedings of the International Conference on IT Convergence and Security 2011 by Kim, Kuinam J. Publication: . XIV, 642 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Trends for FPGAS by Badrignans, Benoit. Publication: . XX, 252p. 85 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Machine Learning and Systems Engineering by Ao, Sio-Iong. Publication: . XXII, 614 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
IT Security Management by Partida, Alberto. Publication: . XXXV, 247p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthy Internet by Salgarelli, Luca. Publication: . XVIII, 369p. 84 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
ISSE 2010 Securing Electronic Business Processes by Pohlmann, Norbert. Publication: . XII, 416 p. 80 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Wireless Networks and Security by Khan, Shafiullah. Publication: . VIII, 512 p. 163 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Handbook of Information and Communication Security by Stavroulakis, Peter. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced DPA Theory and Practice by Peeters, Eric. Publication: . XVI, 139 p. 70 illus., 20 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Physical Unclonable Functions in Theory and Practice by Böhm, Christoph. Publication: . XVIII, 270 p. 217 illus., 146 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 4 5 6 7 8 9 10 Next >>

Languages: 
English |
العربية