//]]>
Engineering Secure Software and Systems by Jürjens, Jan. Publication: . XII, 231 p. 40 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligent Information and Database Systems by Selamat, Ali. Publication: . XXIV, 520 p. 156 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligent Information and Database Systems by Selamat, Ali. Publication: . XXIV, 562 p. 182 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Passive and Active Measurement by Roughan, Matthew. Publication: . XII, 282 p. 135 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Rough Sets XVI by Peters, James F. Publication: . X, 221 p. 77 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cognitive Agents for Virtual Environments by Dignum, Frank. Publication: . XII, 185 p. 56 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Process Support and Knowledge Representation in Health Care by Lenz, Richard. Publication: . XIV, 183 p. 48 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Architecture of Computing Systems – ARCS 2013 by Kubátová, Hana. Publication: . XIV, 354 p. 146 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Retrieval Meets Information Visualization by Agosti, Maristella. Publication: . X, 177 p. 89 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Hiding by Kirchner, Matthias. Publication: . X, 285 p. 100 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public-Key Cryptography – PKC 2013 by Kurosawa, Kaoru. Publication: . XIV, 518 p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Chinese Lexical Semantics by Ji, Donghong. Publication: . XVI, 838 p. 129 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Pairing-Based Cryptography – Pairing 2012 by Abdalla, Michel. Publication: . XVI, 333 p. 18 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Reversible Computation by Glück, Robert. Publication: . X, 241 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Agents and Data Mining Interaction by Cao, Longbing. Publication: . XII, 217 p. 81 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Assurances for Self-Adaptive Systems by Cámara, Javier. Publication: . X, 341 p. 94 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols XVII by Christianson, Bruce. Publication: . X, 367 p. 28 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation by Ayala, José L. Publication: . IX, 258 p. 150 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Radio Frequency Identification. Security and Privacy Issues by Hoepman, Jaap-Henk. Publication: . X, 181 p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Construction and Evolution of Code Generators by Jörges, Sven. Publication: . XXIV, 246 p. 75 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية