//]]>
On the Move to Meaningful Internet Systems: OTM 2011 by Meersman, Robert. Publication: . XXVIII, 430 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
On the Move to Meaningful Internet Systems: OTM 2011 by Meersman, Robert. Publication: . XXVII, 407 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Communications and Multimedia Security by Decker, Bart. Publication: . XIV, 257 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms and Architectures for Parallel Processing by Xiang, Yang. Publication: . XVIII, 411p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms and Architectures for Parallel Processing by Xiang, Yang. Publication: . XVIII, 497p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Aspects in Information Technology by Joye, Marc. Publication: . XIV, 187p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Stabilization, Safety, and Security of Distributed Systems by Défago, Xavier. Publication: . XIV, 452 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Provable Security by Boyen, Xavier. Publication: . XIII, 399 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology - ICISC 2010 by Rhee, Kyung-Hyune. Publication: . XIII, 435p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Security – ESORICS 2011 by Atluri, Vijay. Publication: . XIV, 686p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multiple Access Communications by Sacchi, Claudio. Publication: . XIII, 255 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Recent Advances in Intrusion Detection by Sommer, Robin. Publication: . 398p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Warehousing and Knowledge Discovery by Cuzzocrea, Alfredo. Publication: . XIV, 498p. 180 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Energy-Aware Communications by Lehnert, Ralf. Publication: . XIII, 227 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
NETWORKING 2011 Workshops by Casares-Giner, Vicente. Publication: . XVI, 290p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust, Privacy and Security in Digital Business by Furnell, Steven. Publication: . XII, 223 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Infrastructures, Services and Applications by Camenisch, Jan. Publication: . XII, 209 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Detection of Intrusions and Malware, and Vulnerability Assessment by Holz, Thorsten. Publication: . X, 235p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data and Applications Security and Privacy XXV by Li, Yingjiu. Publication: . XI, 309p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy Enhancing Technologies by Fischer-Hübner, Simone. Publication: . X, 285 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية