//]]>
Managing the Dynamics of New Product Development Processes by Karniel, Arie. Publication: . XX, 257p. 133 illus., 27 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Managing Cooperation in Supply Network Structures and Small or Medium-sized Enterprises by Villa, Agostino. Publication: . IX, 108 p. 36 illus., 6 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Energy Economics by Bhattacharyya, Subhes C. Publication: . XXVI, 721p. 267 illus., 83 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Complex Engineering Service Systems by Ng, Irene. Publication: . XIV, 470 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Manufacturing Process Design and Costing by Grewal, Simmy. Publication: . X, 70p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web and Internet Economics by Chen, Yiling. Publication: . XIV, 440 p. 25 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented Computing by Basu, Samik. Publication: . XVIII, 713 p. 260 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
PRIMA 2013: Principles and Practice of Multi-Agent Systems by Boella, Guido. Publication: . XVIII, 536 p. 158 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithmic Game Theory by Vöcking, Berthold. Publication: . XII, 271 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Radio Frequency Identification by Hutter, Michael. Publication: . XIV, 177 p. 59 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Adams, Andrew A. Publication: . XII, 239 p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Research in Attacks, Intrusions, and Defenses by Stolfo, Salvatore J. Publication: . XII, 476 p. 139 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Provable Security by Susilo, Willy. Publication: . X, 347 p. 36 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Communications and Multimedia Security by Decker, Bart. Publication: . XIV, 249 p. 83 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented and Cloud Computing by Lau, Kung-Kiu. Publication: . X, 244 p. 80 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Availability, Reliability, and Security in Information Systems and HCI by Cuzzocrea, Alfredo. Publication: . XVI, 504 p. 156 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mobile Web Information Systems by Daniel, Florian. Publication: . XVI, 306 p. 94 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Security – ESORICS 2013 by Crampton, Jason. Publication: . XVIII, 794 p. 158 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Sadeghi, Ahmad-Reza. Publication: . XVI, 406 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Human Aspects of Information Security, Privacy, and Trust by Marinos, Louis. Publication: . XX, 378 p. 102 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية