//]]>
Availability, Reliability, and Security in Information Systems and HCI by Cuzzocrea, Alfredo. Publication: . XVI, 504 p. 156 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Security – ESORICS 2013 by Crampton, Jason. Publication: . XVIII, 794 p. 158 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Product-Focused Software Process Improvement by Heidrich, Jens. Publication: . XVI, 374 p. 87 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Detection of Intrusions and Malware, and Vulnerability Assessment by Rieck, Konrad. Publication: . XII, 207 p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Boyd, Colin. Publication: . XII, 437 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Design Science at the Intersection of Physical and Virtual Design by Brocke, Jan. Publication: . XVI, 528 p. 130 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Information Systems Engineering by Salinesi, Camille. Publication: . XXXVIII, 706 p. 258 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network and System Security by Lopez, Javier. Publication: . XX, 793 p. 207 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web Information Systems Engineering – WISE 2011 and 2012 Workshops by Haller, Armin. Publication: . XVI, 350 p. 105 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Health Information Science by Huang, Guangyan. Publication: . XIV, 280 p. 92 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented Computing - ICSOC 2012 Workshops by Ghose, Aditya. Publication: . XVI, 466 p. 153 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Foundations and Practice of Security by Garcia-Alfaro, Joaquin. Publication: . XIV, 383 p. 90 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Principles of Security and Trust by Basin, David. Publication: . XX, 287 p. 34 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Privacy Management and Autonomous Spontaneous Security by Pietro, Roberto. Publication: . XIV, 333 p. 100 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Blyth, Jim. Publication: . X, 141 p. 22 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network and System Security by Xu, Li. Publication: . XIV, 532 p. 133 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented Computing by Liu, Chengfei. Publication: . XX, 795 p. 258 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Computing and Applications by Liu, Baoxiang. Publication: . XX, 782 p. 262 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web Information Systems and Mining by Wang, Fu Lee. Publication: . XVIII, 718 p. 271 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented and Cloud Computing by Paoli, Flavio. Publication: . XI, 282 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية