//]]>
Economics of Information Security and Privacy III by Schneier, Bruce. Publication: . X, 283 p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Design of Cloud Workflow Systems by Liu, Xiao. Publication: . XIV, 97p. 33 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
On the Performance of Web Services by Tari, Zahir. Publication: . XII, 244p. 101 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Economics of Financial and Medical Identity Theft by Camp, L. Jean. Publication: . XI, 166p. 10 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
A Primer of Multicast Routing by Rosenberg, Eric. Publication: . X, 117p. 58 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Quantitative Security Risk Assessment of Enterprise Networks by Ou, Xinming. Publication: . XIII, 28p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mobile Intention Recognition by Kiefer, Peter. Publication: . XVI, 168 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Effects of Traffic Structure on Application and Network Performance by Aikat, Jay. Publication: . VIII, 298 p. 394 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Semantic Web Services for Web Databases by Ouzzani, Mourad. Publication: . XXI, 134p. 33 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service Level Agreements for Cloud Computing by Wieder, Philipp. Publication: . XXVI, 358 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intermittently Connected Mobile Ad Hoc Networks by Jamalipour, Abbas. Publication: . XVIII, 110p. 30 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Bootstrapping Trust in Modern Computers by Parno, Bryan. Publication: . IX, 101p. 10 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Science by Blum, Edward K. Publication: . X, 470 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Moving Target Defense by Jajodia, Sushil. Publication: . XVI, 184 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Hard Real-Time Computing Systems by Buttazzo, Giorgio C. Publication: . XVI, 524 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Scalable Network Monitoring in High Speed Networks by Choi, Baek-Young. Publication: . XV, 148p. 76 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Network Programming – Principles and Techniques by Ciubotaru, Bogdan. Publication: . XVI, 250 p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
An Introduction to Network Programming with Java by Graba, Jan. Publication: . XII, 380 p. 84 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Botnets by Tiirmaa-Klaar, Heli. Publication: . VIII, 97 p. 5 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Graph Algorithms for Computer Networks by Erciyes, K. Publication: . XVIII, 324 p. 167 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية