//]]>
Handbook of financial cryptography and security /   Publication: Boca Raton, FL : Chapman & Hall/CRC, 2011 . xxvi, 605 p. : 27 cm. Date:2011 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Host Identity Protocol (HIP) : , towards the secure mobile Internet / by Gurtov, Andrei. Publication: Chichester, England : Wiley, 2008 . x, 295 p. : 26 cm. Date:2008 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Windows forensics : , the field guide for conducting corporate computer investigations / by Steel, Chad, Publication: Indianapolis, Ind : Wiley, 2006 . xvii, 382 p. : 24 cm. Date:2006 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
IoT and edge computing for architects : , implementing edge and IoT systems from sensors to clouds with communication systems, analytics, and security / by Lea, Perry, Publication: Birmingham : Packt Publishing, Limited, 2020 . xviii, 606 p. : 24 cm. Date:2020 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Deep learning approaches for security threats in IoT environments / by Abdel-Basset, Mohamed, Publication: Hoboken, New Jersey : John Wiley & Sons, Inc., 2023 . xvi, 368 p. : 23 cm. Date:2023 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية