//]]>
Guide to Reliable Internet Services and Applications by Kalmanek, Charles R. Publication: . VIII, 626p. 336 illus., 168 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms for Next Generation Networks by Cormode, Graham. Publication: . XX, 462p. 286 illus., 143 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Pervasive Computing by Hassanien, Aboul-Ella. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Social Network Analysis by Abraham, Ajith. Publication: . XII, 485p. 203 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Assessment in Vehicular Networks by Du, Suguo. Publication: . XI, 49 p. 9 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
4G Femtocells by Zhang, Haijun. Publication: . IX, 77 p. 21 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Location Privacy Protection in Mobile Networks by Liu, Xinxin. Publication: . XII, 75 p. 23 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Hash Table by Zhang, Hao. Publication: . VIII, 67 p. 15 illus., 3 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks by Tang, Jin. Publication: . X, 86 p. 31 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Resource Management in Utility and Cloud Computing by Zhao, Han. Publication: . XII, 82 p. 22 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cognitive Virtual Network Operator Games by Duan, Lingjie. Publication: . VIII, 74 p. 27 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy in Mobile Social Networks by Liang, Xiaohui. Publication: . VIII, 100 p. 27 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Studies on Urban Vehicular Ad-hoc Networks by Zhu, Hongzi. Publication: . IX, 124 p. 78 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Android Malware by Jiang, Xuxian. Publication: . XI, 44 p. 9 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Modeling Trust Context in Networks by Adali, Sibel. Publication: . VI, 83 p. 13 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web-Scale Data Management for the Cloud by Lehner, Wolfgang. Publication: . XV, 193 p. 74 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Space-Time Coding by Jing, Yindi. Publication: . XIV, 108 p. 21 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Medium Access Control in Wireless Networks by Wang, Ping. Publication: . XII, 109 p. 42 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Physical Layer Approaches for Securing Wireless Communication Systems by Wen, Hong. Publication: . X, 83 p. 53 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Routing for Wireless Multi-Hop Networks by Abdel Hamid, Sherin. Publication: . XV, 73 p. 14 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية