//]]>
Detection of Intrusions and Malware, and Vulnerability Assessment by Rieck, Konrad. Publication: . XII, 207 p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Architecture of Computing Systems – ARCS 2013 by Kubátová, Hana. Publication: . XIV, 354 p. 146 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Communicability, Computer Graphics and Innovative Design for Interactive Systems by Cipolla-Ficarra, Francisco. Publication: . X, 145 p. 76 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Architecture of Computing Systems – ARCS 2012 by Herkersdorf, Andreas. Publication: . XIII, 252 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Model Driven Engineering Languages and Systems by Whittle, Jon. Publication: . XX, 730 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Architecture of Computing Systems - ARCS 2011 by Berekovic, Mladen. Publication: . XIII, 271p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Model Driven Engineering Languages and Systems by Petriu, Dorina C. Publication: . XXI, 424p. 173 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Model Driven Engineering Languages and Systems by Petriu, Dorina C. Publication: . XXI, 422p. 162 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Architecture of Computing Systems - ARCS 2010 by Müller-Schloer, Christian. Publication: . XIII, 247p. 105 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mobile and Ubiquitous Systems: Computing, Networking, and Services by Zheng, Kan. Publication: . X, 289 p. 118 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
E-Business and Telecommunications by Obaidat, Mohammad S. Publication: . XVI, 536 p. 226 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Digital Forensics and Cyber Crime by Gladyshev, Pavel. Publication: . XII, 297 p. 94 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy in Mobile Information and Communication Systems by Schmidt, Andreas U. Publication: . VIII, 130 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Handbook of Data Intensive Computing by Furht, Borko. Publication: . XVIII, 794 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Guide to Cloud Computing by Hill, Richard. Publication: . XXI, 278 p. 38 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy and Security for Cloud Computing by Pearson, Siani. Publication: . XVI, 306 p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Guide to Reliable Distributed Systems by Birman, Kenneth P. Publication: . XXII, 730 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Guide to Software Development by Langer, Arthur M. Publication: . XVIII, 354 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Video Processing in the Cloud by Pereira, Rafael Silva. Publication: . V, 68p. 19 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multimodal Interactive Pattern Recognition and Applications by Toselli, Alejandro Héctor. Publication: . XVI, 274p. 86 illus., 52 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية