በአማርኛ ለመጻፍ እዚህ ጋ ይጫኑ





Table and Images
በአማርኛ ለመጻፍ እዚህ ጋ ይጫኑ





Table and Images

Your search returned 19 results.

Sort
Results
Designing network security / Merike Kaeo.

by Kaeo, Merike.

Edition: 2nd ed.Publication details: Indianapolis, IN : Cisco Press, c2004Availability: Items available for loan: Graduate Library (1)Call number: TK5105.59.K34 2004.
Monographs
Foundations of computer security / David Salomon.

by Salomon, David, 1938-.

Publication details: London : Springer, c2006Online access: Table of contents Availability: Items available for loan: Graduate Library (2).
Monographs
Preserving privacy in On-Line Analytical Processing (OLAP) / by Lingyu Wang, Sushil Jajodia, Duminda Wijesekera.

by Wang, Lingyu | Jajodia, Sushil | Wijesekera, Duminda.

Series: Advances in information security ; v. 29Publication details: New York : Springer, 2007Availability: Items available for loan: Graduate Library (2).
Monographs
A classical introduction to cryptography : applications for communications security / by Serge Vaudenay.

by Vaudenay, Serge.

Publication details: New York : Springer, 2005Availability: Items available for loan: Graduate Library (2).
Monographs
Complexity theory and cryptology : an introduction to cryptocomplexity / Jèorg Rothe.

by Rothe, Jèorg.

Series: Texts in theoretical computer science : an EATCS seriesPublication details: Berlin ; New York : Springer, c2005Availability: Items available for loan: Graduate Library (2).
Monographs
Biometrics, computer security systems and artificial intelligence applications / edited by Khalid Saeed, Jerzy Pejas, Romuald Mosdorf.

by Saeed, Khalid, Ph. D., ed | Pejaâs, Jerzy, 1954- , ed | Mosdorf, Romuald, ed.

Publication details: New York : Springer, c2006Availability: Items available for loan: Graduate Library (2).
Monographs
Multimedia security : steganography and digital watermarking techniques for protection of intellectual property / Chun-Shien Lu, editor.

by Lu, Chun-Shien, ed.

Publication details: Hershey PA : Idea Group Publishing, c2005Online access: Table of contents Availability: Items available for loan: Graduate Library (2).
Monographs
A process for developing a common vocabulary in the information security area / edited by Jan von Knop, Alexey A. Salnikov, and Valeriy V. Yaschenko.

by Knop, J. V., ed | Sal§nikov, A. A., ed | ëIìAshchenko, ed.

Series: NATO science for peace and security series. General sub-series E, Human and societal dynamics ; ; vol. 23.Publication details: Amsterdam ; Washington, DC : IOS Press, c2007Availability: Items available for loan: Graduate Library (2)Call number: QA76.9.A25N374, ...
Monographs
Distributed systems security issues, processes, and solutions Abhijit Belapurkar ... [et al.].

by Belapurkar, Abhijit.

Publication details: Hoboken, NJ : John Wiley & Sons, 2009Availability: Items available for loan: Graduate Library (2)Call number: QA76.9.A25D567, ...
Monographs
Privacy-preserving data mining : models and algorithms / edited by Charu C, Aggarwal and Philip S. Yu.

by Aggarwal, Charu C, ed | Yu, Philip S, ed.

Publication details: New York : Springer, c2008. Availability: Items available for loan: Graduate Library (2)Call number: QA76.9.P74, ...
Pages
Not finding what you're looking for?

2019 © Addis Ababa University Libraries

2019 © Addis Ababa University Libraries