//]]>
Privacy Enhancing Technologies by Atallah, Mikhail J. Publication: . X, 291p. 51 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Theoretic Security by Kurosawa, Kaoru. Publication: . X, 249p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Data Hiding and Multimedia Security V by Shi, Yun Q. Publication: . XI, 129p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Detection of Intrusions and Malware, and Vulnerability Assessment by Kreibich, Christian. Publication: . XII, 219p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Requirements Engineering: Foundation for Software Quality by Wieringa, Roel. Publication: . XII, 280p. 62 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computers Helping People with Special Needs by Miesenberger, Klaus. Publication: . 644p. 306 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computers Helping People with Special Needs by Miesenberger, Klaus. Publication: . 727p. 177 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Haptics: Generating and Perceiving Tangible Sensations by Kappers, Astrid M. L. Publication: . XX, 460p. 227 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Haptics: Generating and Perceiving Tangible Sensations by Kappers, Astrid M. L. Publication: . 440p. 246 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Networked Services and Applications - Engineering, Control and Management by Aagesen, Finn Arve. Publication: . XIII, 275p. 125 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Natural Language Processing and Information Systems by Hopfe, Christina J. Publication: . 327p. 74 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust and Trustworthy Computing by Acquisti, Alessandro. Publication: . XIII, 441p. 84 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Product-Focused Software Process Improvement by Ali Babar, M. Publication: . XIII, 410p. 115 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Architecting Critical Systems by Giese, Holger. Publication: . 205p. 82 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Agent and Multi-Agent Systems: Technologies and Applications by Jędrzejowicz, Piotr. Publication: . XVIII, 443p. 147 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Agent and Multi-Agent Systems: Technologies and Applications by Jędrzejowicz, Piotr. Publication: . 450p. 142 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Communications and Multimedia Security by Decker, Bart. Publication: . XIII, 281p. 74 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Towards Trustworthy Elections by Chaum, David. Publication: . VIII, 403p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security, Practice and Experience by Kwak, Jin. Publication: . XIII, 399p. 68 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ethics and Policy of Biometrics by Kumar, Ajay. Publication: . VIII, 169p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية