//]]>
Public Key Cryptography – PKC 2011 by Catalano, Dario. Publication: . XIII, 495p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Privacy Management and Autonomous Spontaneous Security by Garcia-Alfaro, Joaquin. Publication: . XIV, 259 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Passive and Active Measurement by Spring, Neil. Publication: . XI, 246 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Open Research Problems in Network Security by Camenisch, Jan. Publication: . VIII, 171 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web and Wireless Geographical Information Systems by Tanaka, Katsumi. Publication: . X, 241p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Digital Privacy by Camenisch, Jan. Publication: . Approx. 800 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Adaptive Multimedia Retrieval. Understanding Media and Adapting to the User by Detyniecki, Marcin. Publication: . X, 159p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Vagueness in Communication by Nouwen, Rick. Publication: . VII, 207p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
SOFSEM 2011: Theory and Practice of Computer Science by Černá, Ivana. Publication: . XIV, 572p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Rough Sets XIII by Peters, James F. Publication: . VIII, 277p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Verification of Object-Oriented Software by Beckert, Bernhard. Publication: . X, 199p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Knowledge Representation for Health-Care by Riaño, David. Publication: . X, 153p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms and Models for the Web-Graph by Kumar, Ravi. Publication: . VIII, 163p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Applications by Chung, Yongwha. Publication: . XIII, 352p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Multimedia Modeling by Lee, Kuo-Tien. Publication: . XXIII, 562p. 303 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Multimedia Modeling by Lee, Kuo-Tien. Publication: . XXIII, 492p. 281 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Provenance and Annotation of Data and Processes by McGuinness, Deborah L. Publication: . XII, 306p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols by Christianson, Bruce. Publication: . VIII, 257p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Semantic Web – ISWC 2010 by Patel-Schneider, Peter F. Publication: . XXII, 373p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Semantic Web – ISWC 2010 by Patel-Schneider, Peter F. Publication: . XXI, 833p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية