//]]>
Analysis of Social Media and Ubiquitous Data by Atzmueller, Martin. Publication: . VIII, 163p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Secure Data Management by Jonker, Willem. Publication: . X, 170p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Warehousing and Knowledge Discovery by Cuzzocrea, Alfredo. Publication: . XIV, 498p. 180 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Energy-Aware Communications by Lehnert, Ralf. Publication: . XIII, 227 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Electronic Participation by Tambouris, Efthimios. Publication: . XI, 315 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Availability, Reliability and Security for Business, Enterprise and Health Information Systems by Tjoa, A Min. Publication: . XIII, 388 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Electronic Government and the Information Systems Perspective by Andersen, Kim Normann. Publication: . XIV, 410p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Haptic and Audio Interaction Design by Cooper, Eric W. Publication: . XII, 135 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust, Privacy and Security in Digital Business by Furnell, Steven. Publication: . XII, 223 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Electronic Government by Janssen, Marijn. Publication: . XVI, 466 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – CRYPTO 2011 by Rogaway, Phillip. Publication: . XV, 782p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Infrastructures, Services and Applications by Camenisch, Jan. Publication: . XII, 209 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Computational Science XIII by Gavrilova, Marina L. Publication: . XX, 205 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Trust Management by Cuellar, Jorge. Publication: . X, 271 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Collaborative Agents - Research and Development by Guttmann, Christian. Publication: . VIII, 187p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Detection of Intrusions and Malware, and Vulnerability Assessment by Holz, Thorsten. Publication: . X, 235p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Computational Science XII by Gavrilova, Marina L. Publication: . XIV, 279 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Natural Language Processing and Information Systems by Muñoz, Rafael. Publication: . XV, 350 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy Enhancing Technologies by Fischer-Hübner, Simone. Publication: . X, 285 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligence and Security Informatics by Chau, Michael. Publication: . X, 133p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية