//]]>
Information Systems Security by Venkatakrishnan, Venkat. Publication: . XVI, 353 p. 96 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multiple Access Communications by Bellalta, Boris. Publication: . XII, 183 p. 67 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – ASIACRYPT 2012 by Wang, Xiaoyun. Publication: . XVI, 780 p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology - INDOCRYPT 2012 by Galbraith, Steven. Publication: . XIV, 566 p. 118 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Outreach of Digital Libraries: A Globalized Resource Network by Chen, Hsin-Hsi. Publication: . XXII, 372 p. 129 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Testing Software and Systems by Nielsen, Brian. Publication: . X, 263 p. 97 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data and Knowledge Engineering by Xiang, Yang. Publication: . XII, 251 p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Blyth, Jim. Publication: . X, 141 p. 22 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Foundations of Intelligent Systems by Chen, Li. Publication: . XX, 468 p. 152 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network and System Security by Xu, Li. Publication: . XIV, 532 p. 133 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Artificial Intelligence - SBIA 2012 by Barros, Leliane N. Publication: . XVI, 233 p. 77 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security, Privacy, and Applied Cryptography Engineering by Bogdanov, Andrey. Publication: . XII, 173 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented Computing by Liu, Chengfei. Publication: . XX, 795 p. 258 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Decision and Game Theory for Security by Grossklags, Jens. Publication: . XII, 309 p. 48 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Provenance and Annotation of Data and Processes by Groth, Paul. Publication: . XII, 256 p. 94 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Secure IT Systems by Jøsang, Audun. Publication: . X, 247 p. 62 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Large-Scale Data- and Knowledge-Centered Systems VI by Hameurlain, Abdelkader. Publication: . XII, 259 p. 113 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Structural, Syntactic, and Statistical Pattern Recognition by Gimel’farb, Georgy. Publication: . XVIII, 755 p. 236 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Intelligent Data Analysis XI by Hollmén, Jaakko. Publication: . XIV, 426 p. 136 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Information and Computer Security by Hanaoka, Goichiro. Publication: . XII, 261 p. 33 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية