//]]>
Security Protocols XIX by Christianson, Bruce. Publication: . IX, 383 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Data Mining and Applications by Tang, Jie. Publication: . XVII, 419 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Data Mining and Applications by Tang, Jie. Publication: . XVIII, 426 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
AI 2011: Advances in Artificial Intelligence by Wang, Dianhui. Publication: . XVII, 821 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multi-disciplinary Trends in Artificial Intelligence by Sombattheera, Chattrakul. Publication: . 444p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Retrieval Technology by Salem, Mohamed Vall Mohamed. Publication: . XV, 626 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms and Computation by Asano, Takao. Publication: . XVIII, 775 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – INDOCRYPT 2011 by Bernstein, Daniel J. Publication: . XIII, 401 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Performance Evaluation of Computer and Communication Systems. Milestones and Future Challenges by Hummel, Karin Anna. Publication: . XII, 255 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Learning and Intelligent Optimization by Coello, Carlos A. Coello. Publication: . XVII, 636 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptography and Coding by Chen, Liqun. Publication: . XIII, 497 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Internet and Network Economics by Chen, Ning. Publication: . XII, 420 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Biometric Recognition by Sun, Zhenan. Publication: . XIV, 290p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Post-Quantum Cryptography by Yang, Bo-Yin. Publication: Berlin, Heidelberg : Springer Berlin Heidelberg, 2011 Date:2011 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – ASIACRYPT 2011 by Lee, Dong Hoon. Publication: . XIV, 760 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
RFID. Security and Privacy by Juels, Ari. Publication: . X, 260p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trusted Systems by Chen, Liqun. Publication: . XIV, 362p. 73 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Decision and Game Theory for Security by Baras, John S. Publication: . X, 259 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Artificial Intelligence by Lozano, Jose A. Publication: . XV, 506 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Computing and Applications by Liu, Baoxiang. Publication: . XVIII, 775 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية