//]]>
Trust, Privacy and Security in Digital Business by Fischer-Hübner, Simone. Publication: . XI, 242 p. 82 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web-Age Information Management by Gao, Hong. Publication: . XV, 486p. 227 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – CRYPTO 2012 by Safavi-Naini, Reihaneh. Publication: . XV, 888 p. 103 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology - ICISC 2011 by Kim, Howon. Publication: . XII, 512 p. 98 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented Computing - ICSOC 2011 Workshops by Pallis, George. Publication: . XII, 334 p. 106 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Wireless Algorithms, Systems, and Applications by Wang, Xinbing. Publication: . XII, 680 p. 295 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Bisociative Knowledge Discovery by Berthold, Michael R. Publication: . IX, 485 p. 146 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Agents and Peer-to-Peer Computing by Beneventano, Domenico. Publication: . XIV, 153p. 48 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Methodologies and Technologies for Networked Enterprises by Anastasi, Giuseppe. Publication: . XX, 453 p. 170 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy Enhancing Technologies by Fischer-Hübner, Simone. Publication: . X, 319p. 89 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ad-hoc, Mobile, and Wireless Networks by Li, Xiang-Yang. Publication: . XIV, 486p. 214 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automata, Languages, and Programming by Czumaj, Artur. Publication: . 860p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automata, Languages, and Programming by Czumaj, Artur. Publication: . 700p. 51 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data and Applications Security and Privacy XXVI by Cuppens-Boulahia, Nora. Publication: . X, 340 p. 91 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Parallel Processing and Applied Mathematics by Wyrzykowski, Roman. Publication: . XXVII, 663 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Parallel Processing and Applied Mathematics by Wyrzykowski, Roman. Publication: . XXVII, 765 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology - AFRICACRYPT 2012 by Mitrokotsa, Aikaterini. Publication: . XI, 424p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Autonomous and Intelligent Systems by Kamel, Mohamed. Publication: . VIII, 270 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Cryptography and Network Security by Bao, Feng. Publication: . XIV, 580p. 107 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Scientific and Statistical Database Management by Ailamaki, Anastasia. Publication: . XVII, 654p. 318 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية