//]]>
Counterterrorism and Cybersecurity by Lee, Newton. Publication: . XII, 234 p. 23 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Outlier Analysis by Aggarwal, Charu C. Publication: . XV, 446 p. 49 illus., 10 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Analysis of Terrorist Groups: Lashkar-e-Taiba by Subrahmanian, V.S. Publication: . XIV, 231 p. 23 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mining Text Data by Aggarwal, Charu C. Publication: . XI, 522p. 37 illus., 10 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Domain Driven Data Mining by Cao, Longbing. Publication: . XIII, 237p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Dark Web by Chen, Hsinchun. Publication: . XXVI, 454 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Informatics by Yang, Christopher C. Publication: . VI, 206p. 120 illus., 60 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية