//]]>
Radio Frequency Identification by Hutter, Michael. Publication: . XIV, 177 p. 59 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Adams, Andrew A. Publication: . XII, 239 p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Rough Sets and Knowledge Technology by Lingras, Pawan. Publication: . XIV, 414 p. 84 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Measurement Methodology and Tools by Fàbrega, Lluís. Publication: . VIII, 205 p. 96 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Research in Attacks, Intrusions, and Defenses by Stolfo, Salvatore J. Publication: . XII, 476 p. 139 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligent Data Engineering and Automated Learning – IDEAL 2013 by Yin, Hujun. Publication: . XVIII, 639 p. 215 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
From Sounds to Music and Emotions by Aramaki, Mitsuko. Publication: . XIV, 502 p. 159 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Semantic Web: ESWC 2013 Satellite Events by Cimiano, Philipp. Publication: . XXII, 347 p. 102 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web Information Systems Engineering – WISE 2013 by Lin, Xuemin. Publication: . XXVIII, 526 p. 174 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Provable Security by Susilo, Willy. Publication: . X, 347 p. 36 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security, Privacy, and Applied Cryptography Engineering by Gierlichs, Benedikt. Publication: . XIV, 191 p. 35 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Large-Scale Data- and Knowledge-Centered Systems X by Hameurlain, Abdelkader. Publication: . XII, 201 p. 91 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing by Ciucci, Davide. Publication: . XIV, 398 p. 77 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Methods and Software Engineering by Groves, Lindsay. Publication: . XVIII, 466 p. 136 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
New Trends in Image Analysis and Processing – ICIAP 2013 by Petrosino, Alfredo. Publication: . XXIV, 561 p. 229 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Image Analysis and Processing – ICIAP 2013 by Petrosino, Alfredo. Publication: . XXVII, 764 p. 342 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Image Analysis and Processing – ICIAP 2013 by Petrosino, Alfredo. Publication: . XXVII, 858 p. 385 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Web-Based Learning – ICWL 2013 by Wang, Jhing-Fa. Publication: . XVI, 352 p. 133 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthy Global Computing by Palamidessi, Catuscia. Publication: . X, 213 p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web Information Systems Engineering – WISE 2013 by Lin, Xuemin. Publication: . XXVIII, 542 p. 189 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية