//]]>
Interactive Theorem Proving by Blazy, Sandrine. Publication: . XII, 498 p. 73 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Detection of Intrusions and Malware, and Vulnerability Assessment by Rieck, Konrad. Publication: . XII, 207 p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
E-Voting and Identify by Heather, James. Publication: . X, 211 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Emerging Management Mechanisms for the Future Internet by Doyen, Guillaume. Publication: . XVI, 161 p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems by Cavallaro, Lorenzo. Publication: . XVI, 145 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Infocomm Technology by Guyot, Vincent. Publication: . XVI, 358 p. 153 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented Computing - ICSOC 2012 Workshops by Ghose, Aditya. Publication: . XVI, 466 p. 153 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Smart Card Research and Advanced Applications by Mangard, Stefan. Publication: . XII, 297 p. 98 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Foundations and Practice of Security by Garcia-Alfaro, Joaquin. Publication: . XIV, 383 p. 90 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fundamental Approaches to Software Engineering by Cortellessa, Vittorio. Publication: . XX, 376 p. 90 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Pervasive Computing and the Networked World by Zu, Qiaohong. Publication: . XXII, 921 p. 434 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Engineering Secure Software and Systems by Jürjens, Jan. Publication: . XII, 231 p. 40 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Radio Frequency Identification. Security and Privacy Issues by Hoepman, Jaap-Henk. Publication: . X, 181 p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Methods for Components and Objects by Beckert, Bernhard. Publication: . X, 356 p. 129 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Aspects of Component Software by Arbab, Farhad. Publication: . X, 369 p. 131 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Computing and Networking by Frey, Davide. Publication: . XX, 466 p. 121 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network and Parallel Computing by Park, James J. Publication: . XX, 647 p. 253 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Programming Languages and Systems by Jhala, Ranjit. Publication: . XII, 389 p. 104 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Middleware 2012 by Narasimhan, Priya. Publication: . XVI, 498 p. 208 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Internet and Distributed Computing Systems by Xiang, Yang. Publication: . XIV, 289 p. 182 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 4 5 6 7 8 9 10 Next >>

Languages: 
English |
العربية