//]]>
Information Security Technology for Applications by Aura, Tuomas. Publication: . X, 289 p. 73 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Grid and Pervasive Computing Workshops by Rautiainen, Mika. Publication: . Approx. 195 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Foundations and Practice of Security by Garcia-Alfaro, Joaquin. Publication: . XIII, 253 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Applications by Jung, Souhwan. Publication: . XII, 271p. 74 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Engineering and Management by Kannan, Rajkumar. Publication: . Approx. 355 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Verified Software: Theories, Tools, Experiments by Joshi, Rajeev. Publication: . XI, 326p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Knowledge Representation for Health-Care by Riaño, David. Publication: . X, 171 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Practical Aspects of Declarative Languages by Russo, Claudio. Publication: . Approx. 315 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
SOFSEM 2012: Theory and Practice of Computer Science by Bieliková, Mária. Publication: . XVII, 674 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computation, Physics and Beyond by Dinneen, Michael J. Publication: . XIII, 427p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Agents and Data Mining Interaction by Cao, Longbing. Publication: . XIII, 361 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Open Problems in Network Security by Camenisch, Jan. Publication: . VIII, 161p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Aided Systems Theory – EUROCAST 2011 by Moreno-Díaz, Roberto. Publication: . 637p. 276 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Danezis, George. Publication: . Approx. 335 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Aided Systems Theory – EUROCAST 2011 by Moreno-Díaz, Roberto. Publication: . XXV, 637 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Curves and Surfaces by Boissonnat, Jean-Daniel. Publication: . X, 748 p. 355 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Resource Discovery by Lacroix, Zoé. Publication: . VIII, 191 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Perception and Machine Intelligence by Kundu, Malay K. Publication: . XVII, 380 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Security and Applications by Mödersheim, Sebastian. Publication: . IX, 225 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Multimedia Modeling by Schoeffmann, Klaus. Publication: . XX, 795 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية