//]]>
Network and Parallel Computing by Park, James J. Publication: . XX, 647 p. 253 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented Computing by Maglio, Paul P. Publication: . XX, 737p. 285 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Security – ESORICS 2010 by Gritzalis, Dimitris. Publication: . XIV, 718p. 163 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthy Ubiquitous Computing by Khalil, Ismail. Publication: . XIX, 267 p. 117 illus., 47 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cyber Security and Privacy by Felici, Massimo. Publication: . XIV, 177 p. 44 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mobile Wireless Middleware, Operating Systems, and Applications by Cai, Ying. Publication: . XVI, 508p. 209 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Economics of Information Security and Privacy III by Schneier, Bruce. Publication: . X, 283 p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network Intrusion Detection and Prevention by Ghorbani, Ali A. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية