//]]>
Information Theoretic Security by Kurosawa, Kaoru. Publication: . X, 249p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web Services and Formal Methods by Laneve, Cosimo. Publication: . VII, 197p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information, Security and Cryptology – ICISC 2009 by Lee, Donghoon. Publication: . XIII, 387p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Resource Discovery by Lacroix, Zoé. Publication: . IX, 141p. 40 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Self-Organizing Architectures by Weyns, Danny. Publication: . X, 301p. 110 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Information Infrastructures Security by Rome, Erich. Publication: . XII, 213p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Case-Based Reasoning. Research and Development by Bichindaritz, Isabelle. Publication: . 557p. 180 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web-Age Information Management by Chen, Lei. Publication: . XIX, 785p. 320 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Detection of Intrusions and Malware, and Vulnerability Assessment by Kreibich, Christian. Publication: . XII, 219p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Requirements Engineering: Foundation for Software Quality by Wieringa, Roel. Publication: . XII, 280p. 62 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automata, Languages and Programming by Abramsky, Samson. Publication: . XXIV, 614p. 78 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Artifical Evolution by Collet, Pierre. Publication: . XII, 207p. 75 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Steinfeld, Ron. Publication: . XII, 403p. 40 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mechanisms for Autonomous Management of Networks and Services by Stiller, Burkhard. Publication: . XIII, 179p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Networked Services and Applications - Engineering, Control and Management by Aagesen, Finn Arve. Publication: . XIII, 275p. 125 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web Engineering by Benatallah, Boualem. Publication: . 528p. 231 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust and Trustworthy Computing by Acquisti, Alessandro. Publication: . XIII, 441p. 84 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fast Software Encryption by Hong, Seokhie. Publication: . XI, 385p. 71 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Research into Practice – Reality and Gaps by Heineman, George T. Publication: . X, 183p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Scientific and Statistical Database Management by Gertz, Michael. Publication: . XV, 660p. 285 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية