//]]>
Architecture of Computing Systems – ARCS 2013 by Kubátová, Hana. Publication: . XIV, 354 p. 146 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Retrieval Meets Information Visualization by Agosti, Maristella. Publication: . X, 177 p. 89 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Hiding by Kirchner, Matthias. Publication: . X, 285 p. 100 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public-Key Cryptography – PKC 2013 by Kurosawa, Kaoru. Publication: . XIV, 518 p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Agents and Data Mining Interaction by Cao, Longbing. Publication: . XII, 217 p. 81 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols XVII by Christianson, Bruce. Publication: . X, 367 p. 28 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Radio Frequency Identification. Security and Privacy Issues by Hoepman, Jaap-Henk. Publication: . X, 181 p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Construction and Evolution of Code Generators by Jörges, Sven. Publication: . XXIV, 246 p. 75 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Software Language Engineering by Czarnecki, Krzysztof. Publication: . XII, 413 p. 172 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Citizen in Sensor Networks by Nin, Jordi. Publication: . VIII, 95 p. 35 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Computing and Internet Technology by Hota, Chittaranjan. Publication: . XIV, 574 p. 189 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Software Engineering by Lucia, Andrea. Publication: . X, 237 p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mathematical and Engineering Methods in Computer Science by Kučera, Antonín. Publication: . XII, 213 p. 32 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Semantics in Data and Knowledge Bases by Schewe, Klaus-Dieter. Publication: . XII, 199 p. 18 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Selected Areas in Cryptography by Knudsen, Lars R. Publication: . XIV, 407 p. 61 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Privacy Management and Autonomous Spontaneous Security by Pietro, Roberto. Publication: . XIV, 333 p. 100 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Methods for Components and Objects by Beckert, Bernhard. Publication: . X, 356 p. 129 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Aspects of Component Software by Păsăreanu, Corina S. Publication: . X, 277 p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Computational Science XVII by Gavrilova, Marina L. Publication: . XII, 199 p. 86 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trends and Topics in Computer Vision by Kutulakos, Kiriakos N. Publication: . XX, 357 p. 183 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية