//]]>
Computational Social Network Analysis by Abraham, Ajith. Publication: . XII, 485p. 203 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transportation and Information by Thakuriah, Piyushimita (Vonu). Publication: . X, 127 p. 3 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Requirements Engineering and Management for Software Development Projects by Chemuturi, Murali. Publication: . XXI, 266 p. 20 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
On the Performance of Web Services by Tari, Zahir. Publication: . XII, 244p. 101 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Quantitative Security Risk Assessment of Enterprise Networks by Ou, Xinming. Publication: . XIII, 28p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Security Breaches and Privacy in Europe by Wong, Rebecca. Publication: . VII, 54 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Countering Brandjacking in the Digital Age by Hofman, Christopher. Publication: . VIII, 87 p. 18 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Understanding Learning in Virtual Worlds by Childs, Mark. Publication: . XXII, 179 p. 39 illus., 36 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
ECSCW 2013: Proceedings of the 13th European Conference on Computer Supported Cooperative Work, 21-25 September 2013, Paphos, Cyprus by Bertelsen, Olav W. Publication: . XIV, 300 p. 30 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy in Biometrics by Campisi, Patrizio. Publication: . X, 438 p. 114 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Explaining Algorithms Using Metaphors by Forišek, Michal. Publication: . X, 94 p. 59 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Disclosure of Security Vulnerabilities by Maurushat, Alana. Publication: . X, 121 p. 4 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ethical and Social Issues in the Information Age by Kizza, Joseph Migga. Publication: . XVIII, 372 p. 22 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Eye Gaze in Intelligent User Interfaces by Nakano, Yukiko I. Publication: . X, 207 p. 84 illus., 71 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Secure Information Society by Krüger, Jörg. Publication: . X, 213 p. 41 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Energy-Efficient High Performance Computing by Laros III, James H. Publication: . XIV, 67 p. 19 illus., 8 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Connecting Families by Neustaedter, Carman. Publication: . VIII, 197 p. 41 illus., 34 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy and Security for Cloud Computing by Pearson, Siani. Publication: . XVI, 306 p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
A Journey Through Cultures by Salgado, Luciana Cardoso de Castro. Publication: . XIII, 128 p. 48 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Anonymization by Weber, Rolf H. Publication: . VII, 73p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية