//]]>
Information Security and Cryptology - ICISC 2010 by Rhee, Kyung-Hyune. Publication: . XIII, 435p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Security – ESORICS 2011 by Atluri, Vijay. Publication: . XIV, 686p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Software Architecture by Crnkovic, Ivica. Publication: . XV, 448p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multiple Access Communications by Sacchi, Claudio. Publication: . XIII, 255 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Databases and Information Systems by Eder, Johann. Publication: . XIII, 462 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Recent Advances in Intrusion Detection by Sommer, Robin. Publication: . 398p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Secure Data Management by Jonker, Willem. Publication: . X, 170p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Warehousing and Knowledge Discovery by Cuzzocrea, Alfredo. Publication: . XIV, 498p. 180 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Energy-Aware Communications by Lehnert, Ralf. Publication: . XIII, 227 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Autonomic and Trusted Computing by Calero, Jose M. Alcaraz. Publication: . XII, 259 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information and Communication on Technology for the Fight against Global Warming by Kranzlmüller, Dieter. Publication: . XI, 190 p. 77 illus., 35 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Availability, Reliability and Security for Business, Enterprise and Health Information Systems by Tjoa, A Min. Publication: . XIII, 388 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Holonic and Multi-Agent Systems for Manufacturing by Mařík, Vladimír. Publication: . XIII, 267 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Foundations of Security Analysis and Design VI by Aldini, Alessandro. Publication: . VII, 275p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
NETWORKING 2011 Workshops by Casares-Giner, Vicente. Publication: . XVI, 290p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Electronic Government and the Information Systems Perspective by Andersen, Kim Normann. Publication: . XIV, 410p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Management in Grid and Peer-to-Peer Systems by Hameurlain, Abdelkader. Publication: . X, 135 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust, Privacy and Security in Digital Business by Furnell, Steven. Publication: . XII, 223 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Electronic Government by Janssen, Marijn. Publication: . XVI, 466 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – CRYPTO 2011 by Rogaway, Phillip. Publication: . XV, 782p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية