//]]>
Advances in Cryptology - ASIACRYPT 2010 by Abe, Masayuki. Publication: . XIV, 634p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Decision and Game Theory for Security by Alpcan, Tansu. Publication: . X, 281p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
On the Move to Meaningful Internet Systems, OTM 2010 by Meersman, Robert. Publication: . XXII, 466p. 138 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
On the Move to Meaningful Internet Systems: OTM 2010 by Meersman, Robert. Publication: . XXII, 703p. 230 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Information and Computer Security by Echizen, Isao. Publication: . XIII, 371p. 83 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Radio Frequency Identification: Security and Privacy Issues by Ors Yalcin, Siddika Berna. Publication: . X, 271p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Collective Intelligence. Technologies and Applications by Pan, Jeng-Shyang. Publication: . XV, 514p. 257 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Collective Intelligence. Technologies and Applications by Pan, Jeng-Shyang. Publication: . XV, 472p. 269 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Collective Intelligence. Technologies and Applications by Pan, Jeng-Shyang. Publication: . XXVII, 534p. 217 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Artificial Intelligence and Computational Intelligence by Wang, Fu Lee. Publication: . XXI, 498p. 203 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Artificial Intelligence and Computational Intelligence by Wang, Fu Lee. Publication: . XXII, 386p. 149 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Infrastructures, Services and Applications by Martinelli, Fabio. Publication: . X, 303p. 41 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Hiding by Böhme, Rainer. Publication: . X, 277p. 98 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ubiquitous Knowledge Discovery by May, Michael. Publication: . X, 255p. 51 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology by Bao, Feng. Publication: . XIII, 460p. 75 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Provable Security by Heng, Swee-Huay. Publication: . X, 279p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented Computing. ICSOC/ServiceWave 2009 Workshops by Dan, Asit. Publication: . XXXIV, 584p. 177 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Stabilization, Safety, and Security of Distributed Systems by Dolev, Shlomi. Publication: . XVI, 614p. 150 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Safety, Reliability, and Security by Schoitsch, Erwin. Publication: . X, 482p. 197 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthly Global Computing by Wirsing, Martin. Publication: . XII, 380p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية