//]]>
Information, Security and Cryptology – ICISC 2009 by Lee, Donghoon. Publication: . XIII, 387p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Resource Discovery by Lacroix, Zoé. Publication: . IX, 141p. 40 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Self-Organizing Architectures by Weyns, Danny. Publication: . X, 301p. 110 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Information Infrastructures Security by Rome, Erich. Publication: . XII, 213p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
New Modeling Concepts for Today’s Software Processes by Münch, Jürgen. Publication: . XIV, 382p. 133 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Data Hiding and Multimedia Security V by Shi, Yun Q. Publication: . XI, 129p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Aided Verification by Touili, Tayssir. Publication: . XVI, 676p. 169 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Case-Based Reasoning. Research and Development by Bichindaritz, Isabelle. Publication: . 557p. 180 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web-Age Information Management by Chen, Lei. Publication: . XIX, 785p. 320 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Detection of Intrusions and Malware, and Vulnerability Assessment by Kreibich, Christian. Publication: . XII, 219p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Requirements Engineering: Foundation for Software Quality by Wieringa, Roel. Publication: . XII, 280p. 62 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automata, Languages and Programming by Abramsky, Samson. Publication: . XXIII, 754p. 42 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automata, Languages and Programming by Abramsky, Samson. Publication: . XXIV, 614p. 78 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Artifical Evolution by Collet, Pierre. Publication: . XII, 207p. 75 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Euro-Par 2009 – Parallel Processing Workshops by Lin, Hai-Xiang. Publication: . XIX, 468p. 137 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
ECOOP 2010 – Object-Oriented Programming by D’Hondt, Theo. Publication: . XIII, 599p. 196 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Steinfeld, Ron. Publication: . XII, 403p. 40 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Software Composition by Baudry, Benoît. Publication: . VIII, 155p. 56 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computing and Combinatorics by Thai, My T. Publication: . 553p. 103 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mechanisms for Autonomous Management of Networks and Services by Stiller, Burkhard. Publication: . XIII, 179p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية