//]]>
Data Warehousing and Knowledge Discovery by Cuzzocrea, Alfredo. Publication: . XIII, 454 p. 198 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multidisciplinary Research and Practice for Information Systems by Quirchmayr, Gerald. Publication: . XV, 683 p. 235 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Business System Management and Engineering by Ardagna, Claudio A. Publication: . X, 197 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Technology in Bio- and Medical Informatics by Böhm, Christian. Publication: . X, 173 p. 51 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Management in Cloud, Grid and P2P Systems by Hameurlain, Abdelkader. Publication: . IX, 113 p. 34 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trusted Systems by Chen, Liqun. Publication: . XII, 351 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust, Privacy and Security in Digital Business by Fischer-Hübner, Simone. Publication: . XI, 242 p. 82 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Theoretic Security by Smith, Adam. Publication: . XI, 219 p. 28 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web-Age Information Management by Gao, Hong. Publication: . XV, 486p. 227 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Similarity Search and Applications by Navarro, Gonzalo. Publication: . X, 247 p. 90 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – CRYPTO 2012 by Safavi-Naini, Reihaneh. Publication: . XV, 888 p. 103 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Bioinformatics and Computational Biology by Souto, Marcilio C. Publication: . XII, 204p. 62 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology - ICISC 2011 by Kim, Howon. Publication: . XII, 512 p. 98 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented Computing - ICSOC 2011 Workshops by Pallis, George. Publication: . XII, 334 p. 106 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Verification of Object-Oriented Software by Beckert, Bernhard. Publication: . X, 251 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy Enhancing Technologies by Fischer-Hübner, Simone. Publication: . X, 319p. 89 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ad-hoc, Mobile, and Wireless Networks by Li, Xiang-Yang. Publication: . XIV, 486p. 214 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Brain Inspired Cognitive Systems by Zhang, Huaguang. Publication: . XVI, 421p. 146 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data and Applications Security and Privacy XXVI by Cuppens-Boulahia, Nora. Publication: . X, 340 p. 91 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Machine Learning and Data Mining in Pattern Recognition by Perner, Petra. Publication: . XIII, 680 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية