//]]>
Security Protocols XXI by Christianson, Bruce. Publication: . X, 267 p. 23 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Testing Software and Systems by Yenigün, Hüsnü. Publication: . XIV, 291 p. 84 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
In Search of Elegance in the Theory and Practice of Computation by Tannen, Val. Publication: . XII, 569 p. 121 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Implementation and Application of Functional Languages by Hinze, Ralf. Publication: . X, 241 p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Constraint Solving and Language Processing by Duchier, Denys. Publication: . XII, 179 p. 30 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithmic Decision Theory by Perny, Patrice. Publication: . XII, 442 p. 96 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Evolution of Telecommunication Services by Bertin, Emmanuel. Publication: . XII, 327 p. 105 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Modeling Decisions for Artificial Intelligence by Torra, Vicenç. Publication: . XXII, 309 p. 88 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multimodal Communication in Political Speech. Shaping Minds and Social Action by Poggi, Isabella. Publication: . X, 277 p. 34 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Model-Driven Engineering Languages and Systems by Moreira, Ana. Publication: . XXVIII, 792 p. 299 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Computing by Afek, Yehuda. Publication: . XXIV, 586 p. 54 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applications of Declarative Programming and Knowledge Management by Tompits, Hans. Publication: . XIII, 365 p. 67 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Numerical Analysis and Its Applications by Dimov, Ivan. Publication: . XII, 572 p. 135 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Chinese Computational Linguistics and Natural Language Processing Based on Naturally Annotated Big Data by Sun, Maosong. Publication: . XIV, 354 p. 87 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Secure IT Systems by Riis Nielson, Hanne. Publication: . XIV, 321 p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Information Infrastructures Security by Hämmerli, Bernhard M. Publication: . XIV, 277 p. 103 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Information Infrastructure Security by Bologna, Sandro. Publication: . XII, 227 p. 56 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Internet and Distributed Computing Systems by Pathan, Mukaddim. Publication: . XI, 400 p. 179 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Intelligent Data Analysis XII by Tucker, Allan. Publication: . XIV, 464 p. 140 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithmic Game Theory by Vöcking, Berthold. Publication: . XII, 271 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية