//]]>
Trustworthy Computing and Services by Yuan, Yuyu. Publication: . XVIII, 739 p. 301 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Infrastructure Protection VI by Butts, Jonathan. Publication: . XVI, 233 p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
E-Business and Telecommunications by Obaidat, Mohammad S. Publication: . XVI, 536 p. 226 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Communication, Network, and Computing by Das, Vinu V. Publication: . XIV, 459 p. 253 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Digital Forensics and Cyber Crime by Gladyshev, Pavel. Publication: . XII, 297 p. 94 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Internetworking by Meinel, Christoph. Publication: . XIII, 903 p. 426 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Applications for Security, Control and System Engineering by Kim, Tai-hoon. Publication: . XX, 488 p. 228 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network Computing and Information Security by Lei, Jingsheng. Publication: . XX, 829 p. 104 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trends in Enterprise Architecture Research and Practice-Driven Research on Enterprise Transformation by Aier, Stephan. Publication: . XII, 319 p. 77 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Recent Trends in Computer Networks and Distributed Systems Security by Thampi, Sabu M. Publication: . XXI, 508 p. 207 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data-Driven Process Discovery and Analysis by Aberer, Karl. Publication: . X, 213 p. 82 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Digital Forensics VIII by Peterson, Gilbert. Publication: . XVIII, 333 p. 78 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Global Security, Safety and Sustainability & e-Democracy by Georgiadis, Christos K. Publication: . XIV, 290 p. 86 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Understanding High-Dimensional Spaces by Skillicorn, David B. Publication: . IX, 108 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy in Mobile Information and Communication Systems by Schmidt, Andreas U. Publication: . VIII, 130 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
ICT Critical Infrastructures and Society by Hercheui, Magda David. Publication: . X, 399 p. 48 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Future Security by Aschenbruck, Nils. Publication: . Approx. 530 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Engineering Applications of Neural Networks by Jayne, Chrisina. Publication: . Approx. 510 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Convergence and Hybrid Information Technology by Lee, Geuk. Publication: . Approx. 830 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Internet of Things by Wang, Yongheng. Publication: . Approx. 695 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية