//]]>
Information Security Technology for Applications by Aura, Tuomas. Publication: . X, 289 p. 73 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Grid and Pervasive Computing Workshops by Rautiainen, Mika. Publication: . Approx. 195 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Applications by Jung, Souhwan. Publication: . XII, 271p. 74 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Agents and Data Mining Interaction by Cao, Longbing. Publication: . XIII, 361 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Open Problems in Network Security by Camenisch, Jan. Publication: . VIII, 161p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Resource Discovery by Lacroix, Zoé. Publication: . VIII, 191 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Multimedia Modeling by Schoeffmann, Klaus. Publication: . XX, 795 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Adaptive Multimedia Retrieval. Context, Exploration, and Fusion by Detyniecki, Marcin. Publication: . X, 221p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Future Generation Information Technology by Kim, Tai-hoon. Publication: . XIV, 424p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Knowledge Science, Engineering and Management by Xiong, Hui. Publication: . XIV, 474 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Computing and Networking by Bononi, Luciano. Publication: . XIV, 550p. 196 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Semantic Web: ESWC 2011 Workshops by García-Castro, Raúl. Publication: . XIX, 285p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence by Huang, De-Shuang. Publication: . XXIII, 729 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Anaphora Processing and Applications by Hendrickx, Iris. Publication: . X, 199 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols XIX by Christianson, Bruce. Publication: . IX, 383 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Data Mining and Applications by Tang, Jie. Publication: . XVII, 419 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Data Mining and Applications by Tang, Jie. Publication: . XVIII, 426 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
AI 2011: Advances in Artificial Intelligence by Wang, Dianhui. Publication: . XVII, 821 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Middleware 2011 by Kon, Fabio. Publication: . XIII, 514 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Web-Based Learning - ICWL 2011 by Leung, Howard. Publication: . XIV, 334p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية