//]]>
Software Composition by Gschwind, Thomas. Publication: . XII, 195p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Objects, Models, Components, Patterns by Furia, Carlo A. Publication: . XI, 372p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms and Models for the Web Graph by Bonato, Anthony. Publication: . VIII, 179 p. 30 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory and Practice of Model Transformations by Hu, Zhenjiang. Publication: . X, 297p. 115 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligence and Security Informatics by Chau, Michael. Publication: . X, 207p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Telecommunication Economics by Hadjiantonis, Antonis M. Publication: . IX, 243 p. 61 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fun with Algorithms by Kranakis, Evangelos. Publication: . XI, 397p. 148 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Semantic Web: Research and Applications by Simperl, Elena. Publication: . XXI, 877 p. 233 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Future Internet by Álvarez, Federico. Publication: . XXV, 252 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Knowledge Discovery and Data Mining by Tan, Pang-Ning. Publication: . XXIV, 445 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Knowledge Discovery and Data Mining by Tan, Pang-Ning. Publication: . XXIII, 619 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthy Global Computing by Bruni, Roberto. Publication: . X, 243p. 54 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Cryptography – PKC 2012 by Fischlin, Marc. Publication: . XIV, 734 p. 63 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
NETWORKING 2012 by Bestak, Robert. Publication: . XXI, 421 p. 182 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
NETWORKING 2012 by Bestak, Robert. Publication: . XXII, 437 p. 191 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
NETWORKING 2012 Workshops by Becvar, Zdenek. Publication: . XVI, 158p. 57 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Trust Management by Meadows, Catherine. Publication: . X, 239p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Semantic Web by Pan, Jeff Z. Publication: . XIII, 436p. 119 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Constructive Side-Channel Analysis and Secure Design by Schindler, Werner. Publication: . Approx. 280 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Danezis, George. Publication: . XII, 185 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية