//]]>
Information Systems Security by Jha, Somesh. Publication: . XIV, 261p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Computational Science X by Gavrilova, Marina L. Publication: . XVIII, 366p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology - INDOCRYPT 2010 by Gong, Guang. Publication: . XVI, 366p. 63 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented Computing by Maglio, Paul P. Publication: . XX, 737p. 285 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Decision and Game Theory for Security by Alpcan, Tansu. Publication: . X, 281p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Current Trends in Web Engineering by Daniel, Florian. Publication: . XXVII, 595p. 202 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Middleware 2010 by Gupta, Indranil. Publication: . XIII, 398p. 166 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
On the Move to Meaningful Internet Systems, OTM 2010 by Meersman, Robert. Publication: . XXII, 466p. 138 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
On the Move to Meaningful Internet Systems: OTM 2010 by Meersman, Robert. Publication: . XXII, 703p. 230 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Information and Computer Security by Echizen, Isao. Publication: . XIII, 371p. 83 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Radio Frequency Identification: Security and Privacy Issues by Ors Yalcin, Siddika Berna. Publication: . X, 271p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Autonomic and Trusted Computing by Xie, Bing. Publication: . XVII, 328p. 112 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Infrastructures, Services and Applications by Martinelli, Fabio. Publication: . X, 303p. 41 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology by Bao, Feng. Publication: . XIII, 460p. 75 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Provable Security by Heng, Swee-Huay. Publication: . X, 279p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Software Technologies for Embedded and Ubiquitous Systems by Min, Sang Lyul. Publication: . XI, 253p. 90 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented Computing. ICSOC/ServiceWave 2009 Workshops by Dan, Asit. Publication: . XXXIV, 584p. 177 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Aspect-Oriented Software Development VII by Katz, Shmuel. Publication: . XV, 423p. 234 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Stabilization, Safety, and Security of Distributed Systems by Dolev, Shlomi. Publication: . XVI, 614p. 150 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Future Internet - FIS 2010 by Berre, Arne J. Publication: . XII, 157p. 45 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية