//]]>
Advanced Information Systems Engineering by Pernici, Barbara. Publication: . XVI, 548p. 164 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Multidisciplinary Retrieval by Cunningham, Hamish. Publication: . IX, 167p. 52 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms and Complexity by Calamoneri, Tiziana. Publication: . XI, 384p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Grid and Pervasive Computing by Bellavista, Paolo. Publication: . XVII, 701p. 365 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Integer Programming and Combinatorial Optimization by Eisenbrand, Friedrich. Publication: . XIII, 466p. 45 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Cryptography – PKC 2010 by Nguyen, Phong Q. Publication: . XIII, 519p. 34 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Lectures on Software Engineering by Müller, Peter. Publication: . VII, 189p. 99 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Computer Games by Herik, H. Jaap. Publication: . XIV, 233p. 75 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Towards Trustworthy Elections by Chaum, David. Publication: . VIII, 403p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
NETWORKING 2010 by Crovella, Mark. Publication: . XVI, 410p. 181 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Post-Quantum Cryptography by Sendrier, Nicolas. Publication: . X, 241p. 27 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Artificial Intelligence: Theories, Models and Applications by Konstantopoulos, Stasinos. Publication: . XV, 430p. 98 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security, Practice and Experience by Kwak, Jin. Publication: . XIII, 399p. 68 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Argumentation in Multi-Agent Systems by McBurney, Peter. Publication: . X, 321p. 36 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Modeling of Objects Represented in Images by Barneva, Reneta P. Publication: . XV, 326p. 178 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – AFRICACRYPT 2010 by Bernstein, Daniel J. Publication: . XIII, 437p. 43 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Pervasive Computing by Floréen, Patrik. Publication: . XV, 446p. 203 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ethics and Policy of Biometrics by Kumar, Ajay. Publication: . VIII, 169p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Foundations of Computer Software. Future Trends and Techniques for Development by Choppy, Christine. Publication: . IX, 275p. 84 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Natural Language Processing and Information Systems by Horacek, Helmut. Publication: . XVIII, 318p. 65 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية