//]]>
Agent and Multi-Agent Systems: Technologies and Applications by O’Shea, James. Publication: . XVII, 704p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Product-Focused Software Process Improvement by Caivano, Danilo. Publication: . XIII, 353p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Online Communities and Social Computing by Ozok, A. Ant. Publication: . XX, 388p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Design, User Experience, and Usability. Theory, Methods, Tools and Practice by Marcus, Aaron. Publication: . XXXI, 676 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Design, User Experience, and Usability. Theory, Methods, Tools and Practice by Marcus, Aaron. Publication: . XXXI, 718 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust and Trustworthy Computing by McCune, Jonathan M. Publication: . VII, 314p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology by Lai, Xuejia. Publication: . XIV, 524p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ambient Assisted Living by Bravo, José. Publication: . XII, 226p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Coordination, Organizations, Institutions, and Norms in Agent Systems VI by Vos, Marina. Publication: . XVI, 377p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication by Ardagna, Claudio A. Publication: . XIII, 392 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Practice and Experience by Bao, Feng. Publication: . XIII, 448p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Future Internet by Domingue, John. Publication: . XVI, 465 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Theoretic Security by Fehr, Serge. Publication: . X, 227 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
New Horizons in Web-Based Learning - ICWL 2010 Workshops by Luo, Xiangfeng. Publication: . XXIV, 338 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy and Security Issues in Data Mining and Machine Learning by Dimitrakakis, Christos. Publication: . VII, 141 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Requirements Engineering: Foundation for Software Quality by Berry, Daniel. Publication: . XII, 209 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computing with Instinct by Cai, Yang. Publication: . XIII, 163 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Aspects of Security and Trust by Degano, Pierpaolo. Publication: . X, 239 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Social Computing, Behavioral-Cultural Modeling and Prediction by Salerno, John. Publication: . XIII, 384 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Rainbow of Computer Science by Calude, Cristian S. Publication: . XII, 285p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية