//]]>
Security Protocols XVII by Christianson, Bruce. Publication: . X, 367 p. 28 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation by Ayala, José L. Publication: . IX, 258 p. 150 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Radio Frequency Identification. Security and Privacy Issues by Hoepman, Jaap-Henk. Publication: . X, 181 p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Topics in Cryptology – CT-RSA 2013 by Dawson, Ed. Publication: . XIV, 405 p. 68 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms for Sensor Systems by Bar-Noy, Amotz. Publication: . X, 145 p. 26 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Computing and Internet Technology by Hota, Chittaranjan. Publication: . XIV, 574 p. 189 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mathematical and Engineering Methods in Computer Science by Kučera, Antonín. Publication: . XII, 213 p. 32 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Languages and Compilers for Parallel Computing by Rajopadhye, Sanjay. Publication: . X, 299 p. 132 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Selected Areas in Cryptography by Knudsen, Lars R. Publication: . XIV, 407 p. 61 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Privacy Management and Autonomous Spontaneous Security by Pietro, Roberto. Publication: . XIV, 333 p. 100 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Verification, Model Checking, and Abstract Interpretation by Giacobazzi, Roberto. Publication: . XII, 556 p. 123 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Job Scheduling Strategies for Parallel Processing by Cirne, Walfredo. Publication: . X, 273 p. 112 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Computational Science XVII by Gavrilova, Marina L. Publication: . XII, 199 p. 86 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
AI Approaches to the Complexity of Legal Systems. Models and Ethical Challenges for Legal Systems, Legal Language and Legal Ontologies, Argumentation and Software Agents by Palmirani, Monica. Publication: . XIV, 309 p. 67 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols XX by Christianson, Bruce. Publication: . X, 277 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Computing and Networking by Frey, Davide. Publication: . XX, 466 p. 121 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Current Trends in Web Engineering by Grossniklaus, Michael. Publication: . XXII, 245 p. 95 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network and Parallel Computing by Park, James J. Publication: . XX, 647 p. 253 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Future Generation Information Technology by Kim, Tai-hoon. Publication: . XIV, 284 p. 141 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Coordination, Organizations, Institutions, and Norms in Agent System VII by Cranefield, Stephen. Publication: . XIV, 221 p. 61 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية