//]]>
Web Information Systems Engineering – WISE 2011 and 2012 Workshops by Haller, Armin. Publication: . XVI, 350 p. 105 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Health Information Science by Huang, Guangyan. Publication: . XIV, 280 p. 92 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented Computing - ICSOC 2012 Workshops by Ghose, Aditya. Publication: . XVI, 466 p. 153 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Foundations and Practice of Security by Garcia-Alfaro, Joaquin. Publication: . XIV, 383 p. 90 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Principles of Security and Trust by Basin, David. Publication: . XX, 287 p. 34 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public-Key Cryptography – PKC 2013 by Kurosawa, Kaoru. Publication: . XIV, 518 p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Agents and Data Mining Interaction by Cao, Longbing. Publication: . XII, 217 p. 81 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Radio Frequency Identification. Security and Privacy Issues by Hoepman, Jaap-Henk. Publication: . X, 181 p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Privacy Management and Autonomous Spontaneous Security by Pietro, Roberto. Publication: . XIV, 333 p. 100 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology by Wu, Chuan-Kun. Publication: . X, 394 p. 56 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Blyth, Jim. Publication: . X, 141 p. 22 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network and System Security by Xu, Li. Publication: . XIV, 532 p. 133 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented Computing by Liu, Chengfei. Publication: . XX, 795 p. 258 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Computing and Applications by Liu, Baoxiang. Publication: . XX, 782 p. 262 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web Information Systems and Mining by Wang, Fu Lee. Publication: . XVIII, 718 p. 271 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented and Cloud Computing by Paoli, Flavio. Publication: . XI, 282 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Research in Attacks, Intrusions, and Defenses by Balzarotti, Davide. Publication: . XIV, 400 p. 119 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Security – ESORICS 2012 by Foresti, Sara. Publication: . XVII, 896 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Business Process Management by Barros, Alistair. Publication: . XV, 354 p. 128 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Communications and Multimedia Security by Decker, Bart. Publication: . VIII, 239 p. 57 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية