//]]>
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems by Askoxylakis, Ioannis. Publication: . XII, 225p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust and Trustworthy Computing by Katzenbeisser, Stefan. Publication: . XII, 341p. 91 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Experimental Algorithms by Klasing, Ralf. Publication: . XIII, 406p. 116 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Software Service and Application Engineering by Heisel, Maritta. Publication: . Approx. 200 p. 88 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Coordination Models and Languages by Sirjani, Marjan. Publication: . XIV, 277p. 96 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Applications and Interoperable Systems by Göschka, Karl Michael. Publication: . XII, 240p. 71 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Analytical and Stochastic Modeling Techniques and Applications by Al-Begain, Khalid. Publication: . X, 303 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Grid and Pervasive Computing by Li, Ruixuan. Publication: . XIII, 370p. 117 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Wired/Wireless Internet Communication by Koucheryavy, Yevgeni. Publication: . XIV, 382p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Sequences and Their Applications – SETA 2012 by Helleseth, Tor. Publication: . XII, 339 p. 25 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms and Models for the Web Graph by Bonato, Anthony. Publication: . VIII, 179 p. 30 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligence and Security Informatics by Chau, Michael. Publication: . X, 207p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Telecommunication Economics by Hadjiantonis, Antonis M. Publication: . IX, 243 p. 61 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Semantic Web: Research and Applications by Simperl, Elena. Publication: . XXI, 877 p. 233 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Future Internet by Álvarez, Federico. Publication: . XXV, 252 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Knowledge Discovery and Data Mining by Tan, Pang-Ning. Publication: . XXIV, 445 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Knowledge Discovery and Data Mining by Tan, Pang-Ning. Publication: . XXIII, 619 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthy Global Computing by Bruni, Roberto. Publication: . X, 243p. 54 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Cryptography – PKC 2012 by Fischlin, Marc. Publication: . XIV, 734 p. 63 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
NETWORKING 2012 by Bestak, Robert. Publication: . XXI, 421 p. 182 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية