//]]>
Passive and Active Measurement by Taft, Nina. Publication: . XI, 264 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Traffic Monitoring and Analysis by Pescapè, Antonio. Publication: . X, 175 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Selected Areas in Cryptography by Miri, Ali. Publication: . XIII, 431 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptography and Security: From Theory to Applications by Naccache, David. Publication: . XIII, 502 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Architecture of Computing Systems – ARCS 2012 by Herkersdorf, Andreas. Publication: . XIII, 252 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Building a National Distributed e-Infrastructure–PL-Grid by Bubak, Marian. Publication: . XII, 354 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Wireless Sensor Networks by Picco, Gian Pietro. Publication: . XII, 261p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Computing and Internet Technology by Ramanujam, R. Publication: . XI, 277p. 111 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Bioinformatics for Personalized Medicine by Freitas, Ana T. Publication: . XII, 121p. 40 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Software Engineering Techniques by Szmuc, Tomasz. Publication: . Approx. 275 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Current Trends in Web Engineering by Harth, Andreas. Publication: . XXXII, 361p. 119 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Grid and Pervasive Computing Workshops by Rautiainen, Mika. Publication: . Approx. 195 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Foundations and Practice of Security by Garcia-Alfaro, Joaquin. Publication: . XIII, 253 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Applications by Jung, Souhwan. Publication: . XII, 271p. 74 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Agents and Data Mining Interaction by Cao, Longbing. Publication: . XIII, 361 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Open Problems in Network Security by Camenisch, Jan. Publication: . VIII, 161p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Danezis, George. Publication: . Approx. 335 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Resource Discovery by Lacroix, Zoé. Publication: . VIII, 191 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Smart Card Research and Advanced Applications by Prouff, Emmanuel. Publication: . XI, 337 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Agent Technology by Dechesne, Francien. Publication: . XX, 506 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية