//]]>
Transactions on Large-Scale Data- and Knowledge-Centered Systems X by Hameurlain, Abdelkader. Publication: . XII, 201 p. 91 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Electronic Government by Wimmer, Maria A. Publication: . XIV, 335 p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Electronic Participation by Wimmer, Maria A. Publication: . X, 159 p. 39 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Large-Scale Data- and Knowledge-Centered Systems IX by Hameurlain, Abdelkader. Publication: . X, 123 p. 35 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Sadeghi, Ahmad-Reza. Publication: . XVI, 406 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory, Practice, and Applications of Rules on the Web by Morgenstern, Leora. Publication: . XVIII, 249 p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
E-Voting and Identify by Heather, James. Publication: . X, 211 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Radio Frequency Identification. Security and Privacy Issues by Hoepman, Jaap-Henk. Publication: . X, 181 p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trusted Systems by Mitchell, Chris J. Publication: . X, 117 p. 20 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Knowledge Engineering and Knowledge Management by Teije, Annette. Publication: . XVIII, 452 p. 102 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Electronic Participation by Tambouris, Efthimios. Publication: . X, 171 p. 38 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Cryptography for Networks by Visconti, Ivan. Publication: . XI, 582 p. 75 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
E-Voting and Identity by Kiayias, Aggelos. Publication: . X, 257 p. 26 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Methods for Industrial Critical Systems by Stoelinga, Mariëlle. Publication: . XIV, 223 p. 87 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trusted Systems by Chen, Liqun. Publication: . XII, 351 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust, Privacy and Security in Digital Business by Fischer-Hübner, Simone. Publication: . XI, 242 p. 82 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented Computing - ICSOC 2011 Workshops by Pallis, George. Publication: . XII, 334 p. 106 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Deontic Logic in Computer Science by Ågotnes, Thomas. Publication: . XII, 215 p. 21 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Information Systems Engineering by Ralyté, Jolita. Publication: . XVII, 704p. 235 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Economics of Converged, Internet-Based Networks by Cohen, Johanne. Publication: . IX, 75p. 25 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 4 Next >>

Languages: 
English |
العربية