//]]>
Computational Social Networks by Abraham, Ajith. Publication: . XIII, 470 p. 198 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Context Management for Distributed and Dynamic Context-Aware Computing by Rocha, Ricardo Couto Antunes. Publication: . XII, 91p. 35 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Future Wireless and Optical Networks by Jiang, Shengming. Publication: . XVIII, 248p. 80 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cloud Computing for Enterprise Architectures by Mahmood, Zaigham. Publication: . XVIII, 330 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Voice over IP Security by Keromytis, Angelos D. Publication: . XIII, 83p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Real-Time Systems by Kopetz, Hermann. Publication: . XVIII, 378 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Driven e-Science by Lin, Simon C. Publication: . XXII, 517p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Universal Navigation on Smartphones by Karimi, Hassan A. Publication: . X, 157p. 82 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Quantum Attacks on Public-Key Cryptosystems by Yan, Song Y. Publication: . VIII, 207 p. 39 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Grids and Service-Oriented Architectures for Service Level Agreements by Wieder, Philipp. Publication: . XIII, 171p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Queueing Theory for Telecommunications by Alfa, Attahiru Sule. Publication: . XI, 247p. 100 illus., 50 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Evolving Towards the Internetworked Enterprise by Passiante, Giuseppina. Publication: . XI, 213p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Insider Threats in Cyber Security by Probst, Christian W. Publication: . XII, 244 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Economics of Information Security and Privacy by Moore, Tyler. Publication: . XVI, 320p. 100 illus., 50 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Grids, P2P and Services Computing by Desprez, Frédéric. Publication: . XIV, 202p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web Service Mining by Zheng, George. Publication: . XVI, 152p. 40 illus., 20 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Handbook of Cloud Computing by Furht, Borko. Publication: . XIX, 634p. 230 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Managed Grids and Cloud Systems in the Asia-Pacific Research Community by Lin, Simon C. Publication: . XIV, 359p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Handbook of Mobile Ad Hoc Networks for Mobility Models by Roy, Radhika Ranjan. Publication: . X, 1090p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Future Application and Middleware Technology on e-Science by Byeon, Ok-Hwan. Publication: . VI, 169p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية