//]]>
Proceedings of the 2011 International Conference on Informatics, Cybernetics, and Computer Engineering (ICCE2011) November 19-20, 2011, Melbourne, Australia by Jiang, Liangzhong. Publication: . XVI, 720p. 314 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Architecting the Internet of Things by Uckelmann, Dieter. Publication: . XXXI, 351p. 77 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Intelligent Decision Technologies by Phillips-Wren, Gloria. Publication: . 730p. 225 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Uncertainty Theory by Liu, Baoding. Publication: . 350p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Intelligence for Technology Enhanced Learning by Xhafa, Fatos. Publication: . 250p. 63 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web and Internet Economics by Chen, Yiling. Publication: . XIV, 440 p. 25 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
PRIMA 2013: Principles and Practice of Multi-Agent Systems by Boella, Guido. Publication: . XVIII, 536 p. 158 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithmic Game Theory by Vöcking, Berthold. Publication: . XII, 271 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Radio Frequency Identification by Hutter, Michael. Publication: . XIV, 177 p. 59 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Adams, Andrew A. Publication: . XII, 239 p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Research in Attacks, Intrusions, and Defenses by Stolfo, Salvatore J. Publication: . XII, 476 p. 139 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Provable Security by Susilo, Willy. Publication: . X, 347 p. 36 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Communications and Multimedia Security by Decker, Bart. Publication: . XIV, 249 p. 83 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Availability, Reliability, and Security in Information Systems and HCI by Cuzzocrea, Alfredo. Publication: . XVI, 504 p. 156 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mobile Web Information Systems by Daniel, Florian. Publication: . XVI, 306 p. 94 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Security – ESORICS 2013 by Crampton, Jason. Publication: . XVIII, 794 p. 158 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Sadeghi, Ahmad-Reza. Publication: . XVI, 406 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Human Aspects of Information Security, Privacy, and Trust by Marinos, Louis. Publication: . XX, 378 p. 102 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Detection of Intrusions and Malware, and Vulnerability Assessment by Rieck, Konrad. Publication: . XII, 207 p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Boyd, Colin. Publication: . XII, 437 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 4 5 6 7 8 9 10 Next >>

Languages: 
English |
العربية