//]]>
Software Architecture by Drira, Khalil. Publication: . XVI, 354 p. 133 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Modelling Foundations and Applications by Gorp, Pieter. Publication: . X, 237 p. 93 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Emerging Management Mechanisms for the Future Internet by Doyen, Guillaume. Publication: . XVI, 161 p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Cryptography and Network Security by Jacobson, Michael. Publication: . XIV, 572 p. 115 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
SDL 2013: Model-Driven Dependability Engineering by Khendek, Ferhat. Publication: . XII, 291 p. 138 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust and Trustworthy Computing by Huth, Michael. Publication: . XIV, 278 p. 85 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network and System Security by Lopez, Javier. Publication: . XX, 793 p. 207 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Infocomm Technology by Guyot, Vincent. Publication: . XVI, 358 p. 153 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Future Internet by Galis, Alex. Publication: . XLIV, 369 p. 131 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Smart Card Research and Advanced Applications by Mangard, Stefan. Publication: . XII, 297 p. 98 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Social Computing, Behavioral-Cultural Modeling and Prediction by Greenberg, Ariel M. Publication: . XVI, 535 p. 166 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Principles of Security and Trust by Basin, David. Publication: . XX, 287 p. 34 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
System Analysis and Modeling: Theory and Practice by Haugen, Øystein. Publication: . X, 249 p. 91 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols XVII by Christianson, Bruce. Publication: . X, 367 p. 28 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mathematical and Engineering Methods in Computer Science by Kučera, Antonín. Publication: . XII, 213 p. 32 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Privacy Management and Autonomous Spontaneous Security by Pietro, Roberto. Publication: . XIV, 333 p. 100 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Computational Science XVII by Gavrilova, Marina L. Publication: . XII, 199 p. 86 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols XX by Christianson, Bruce. Publication: . X, 277 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Current Trends in Web Engineering by Grossniklaus, Michael. Publication: . XXII, 245 p. 95 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Applications by Lee, Dong Hoon. Publication: . XII, 371 p. 135 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 4 5 6 7 8 9 10 Next >>

Languages: 
English |
العربية