//]]>
Business System Management and Engineering by Ardagna, Claudio A. Publication: . X, 197 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Theoretic Security by Smith, Adam. Publication: . XI, 219 p. 28 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Computational Collective Intelligence VII by Nguyen, Ngoc Thanh. Publication: . XI, 237 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
User Modeling, Adaptation, and Personalization by Masthoff, Judith. Publication: . XVIII, 396p. 105 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Susilo, Willy. Publication: . XIV, 460p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Agent and Multi-Agent Systems. Technologies and Applications by Jezic, Gordan. Publication: . XVII, 661p. 226 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Danezis, George. Publication: . XII, 185 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Technology for Applications by Aura, Tuomas. Publication: . X, 289 p. 73 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithmic Game Theory by Persiano, Giuseppe. Publication: . XI, 327p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Economics of Converged, Internet-Based Networks by Cohen, Johanne. Publication: . IX, 75p. 25 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Human Interface and the Management of Information. Interacting with Information by Smith, Michael J. Publication: . XXX, 673p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Human-Computer Interaction. Users and Applications by Jacko, Julie A. Publication: . XXIV, 711 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithmic Game Theory by Kontogiannis, Spyros. Publication: . VIII, 359p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Sion, Radu. Publication: . X, 257p. 33 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Identity Theft by van der Meulen, Nicole S. Publication: . XIV, 306 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cybercrimes: A Multidisciplinary Analysis by Ghosh, Sumit. Publication: . XIX, 414p. 7 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
CyberForensics by Bayuk, Jennifer. Publication: . XIV, 170 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Targeted Advertising Technologies in the ICT Space by Schlee, Christian. Publication: . XXVI, 339 p. 80 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
IT Enabled Services by Uesugi, Shiro. Publication: . IX, 247 p. 77 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mobile Payment by Lerner, Thomas. Publication: . X, 180 p. 94 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية