//]]>
Health Information Science by Huang, Guangyan. Publication: . XIV, 280 p. 92 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented Computing - ICSOC 2012 Workshops by Ghose, Aditya. Publication: . XVI, 466 p. 153 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Large-Scale Data- and Knowledge-Centered Systems VIII by Hameurlain, Abdelkader. Publication: . XII, 197 p. 99 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Social Computing, Behavioral-Cultural Modeling and Prediction by Greenberg, Ariel M. Publication: . XVI, 535 p. 166 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Foundations and Practice of Security by Garcia-Alfaro, Joaquin. Publication: . XIV, 383 p. 90 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Selected Topics in Performance Evaluation and Benchmarking by Nambiar, Raghunath. Publication: . XIV, 209 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Combinatorial Algorithms by Arumugam, S. Publication: . XII, 303 p. 136 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trusted Systems by Mitchell, Chris J. Publication: . X, 117 p. 20 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Electronic Government by Scholl, Hans J. Publication: . XIII, 279 p. 30 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Provable Security by Takagi, Tsuyoshi. Publication: . XIII, 337 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Keromytis, Angelos D. Publication: . XI, 416 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Cryptography for Networks by Visconti, Ivan. Publication: . XI, 582 p. 75 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Topics in Performance Evaluation, Measurement and Characterization by Nambiar, Raghunath. Publication: . XIV, 213 p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
ICT as Key Technology against Global Warming by Auweter, Axel. Publication: . IX, 127 p. 56 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Warehousing and Knowledge Discovery by Cuzzocrea, Alfredo. Publication: . XIII, 454 p. 198 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Business System Management and Engineering by Ardagna, Claudio A. Publication: . X, 197 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trusted Systems by Chen, Liqun. Publication: . XII, 351 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust, Privacy and Security in Digital Business by Fischer-Hübner, Simone. Publication: . XI, 242 p. 82 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Similarity Search and Applications by Navarro, Gonzalo. Publication: . X, 247 p. 90 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented Computing - ICSOC 2011 Workshops by Pallis, George. Publication: . XII, 334 p. 106 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية