//]]>
Advances in Cryptology – CRYPTO 2012 by Safavi-Naini, Reihaneh. Publication: . XV, 888 p. 103 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy Enhancing Technologies by Fischer-Hübner, Simone. Publication: . X, 319p. 89 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computers Helping People with Special Needs by Miesenberger, Klaus. Publication: . XXX, 683 p. 264 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computers Helping People with Special Needs by Miesenberger, Klaus. Publication: . XXX, 723 p. 258 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Logic, Language and Meaning by Aloni, Maria. Publication: . XII, 482 p. 62 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Haptics: Perception, Devices, Mobility, and Communication by Isokoski, Poika. Publication: . XX, 226p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Haptics: Perception, Devices, Mobility, and Communication by Isokoski, Poika. Publication: . XVI, 650p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Diagrammatic Representation and Inference by Cox, Philip. Publication: . XIII, 358p. 202 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Pervasive Computing by Kay, Judy. Publication: . Approx. 495 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Product-Focused Software Process Improvement by Dieste, Oscar. Publication: . XVI, 378p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Persuasive Technology. Design for Health and Safety by Bang, Magnus. Publication: . Approx. 295 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems by Askoxylakis, Ioannis. Publication: . XII, 225p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Agent and Multi-Agent Systems. Technologies and Applications by Jezic, Gordan. Publication: . XVII, 661p. 226 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust and Trustworthy Computing by Katzenbeisser, Stefan. Publication: . XII, 341p. 91 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligence and Security Informatics by Chau, Michael. Publication: . X, 207p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Telecommunication Economics by Hadjiantonis, Antonis M. Publication: . IX, 243 p. 61 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Future Internet by Álvarez, Federico. Publication: . XXV, 252 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Trust Management by Meadows, Catherine. Publication: . X, 239p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Constructive Side-Channel Analysis and Secure Design by Schindler, Werner. Publication: . Approx. 280 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Danezis, George. Publication: . XII, 185 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية