//]]>
Parallel Computing Technologies by Malyshkin, Victor. Publication: . XIV, 500p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Energy Minimization Methods in Computer Vision and Pattern Recognition by Boykov, Yuri. Publication: . Approx. 450 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Parampalli, Udaya. Publication: . XIII, 464 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Trust Management by Cuellar, Jorge. Publication: . X, 271 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols XVI by Christianson, Bruce. Publication: . IX, 257 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – AFRICACRYPT 2011 by Nitaj, Abderrahmane. Publication: . XIII, 387p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Analytical and Stochastic Modeling Techniques and Applications by Al-Begain, Khalid. Publication: . XI, 347p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Information Infrastructures Security by Xenakis, Christos. Publication: . X, 161p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
End-User Development by Costabile, Maria Francesca. Publication: . XVI, 426p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Managing the Dynamics of Networks and Services by Chrisment, Isabelle. Publication: . X, 181p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Coordination Models and Languages by Meuter, Wolfgang. Publication: . XII, 219p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Methods for Eternal Networked Software Systems by Bernardo, Marco. Publication: . VIII, 527p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Applications and Interoperable Systems by Felber, Pascal. Publication: . XII, 304 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Top Productivity through Software Reuse by Schmid, Klaus. Publication: . XIII, 247p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
NASA Formal Methods by Bobaru, Mihaela. Publication: . XIV, 534 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Adaptive and Natural Computing Algorithms by Dobnikar, Andrej. Publication: . XVI, 403p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Selected Areas in Cryptography by Biryukov, Alex. Publication: . XIII, 411 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Pattern Languages of Programming II by Noble, James. Publication: . IX, 125p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Privacy Management and Autonomous Spontaneous Security by Garcia-Alfaro, Joaquin. Publication: . XIV, 259 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
High Performance Computing for Computational Science – VECPAR 2010 by Palma, José M. Laginha M. Publication: . XIV, 470 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية