//]]>
Modeling and Mining Ubiquitous Social Media by Atzmueller, Martin. Publication: . XII, 183 p. 57 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Safety, Reliability, and Security by Ortmeier, Frank. Publication: . XVIII, 402 p. 138 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Safety, Reliability, and Security by Ortmeier, Frank. Publication: . XVI, 530 p. 198 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Energy Efficient Data Centers by Huusko, Jyrki. Publication: . XII, 153 p. 33 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Web-Based Learning - ICWL 2012 by Popescu, Elvira. Publication: . XIV, 356 p. 90 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Entertainment Computing - ICEC 2012 by Herrlich, Marc. Publication: . XX, 611 p. 189 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligent Robotics and Applications by Su, Chun-Yi. Publication: . XXI, 715 p. 430 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligent Robotics and Applications by Su, Chun-Yi. Publication: . XXXVI, 723 p. 434 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligent Robotics and Applications by Su, Chun-Yi. Publication: . XX, 625 p. 386 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Electronic Government by Scholl, Hans J. Publication: . XIII, 279 p. 30 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
E-Learning and Games for Training, Education, Health and Sports by Göbel, Stefan. Publication: . XVIII, 194 p. 68 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security by Gollmann, Dieter. Publication: . XIV, 402 p. 87 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Research in Attacks, Intrusions, and Defenses by Balzarotti, Davide. Publication: . XIV, 400 p. 119 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Collaboration and Technology by Herskovic, Valeria. Publication: . XIII, 237 p. 63 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Provable Security by Takagi, Tsuyoshi. Publication: . XIII, 337 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Electronic Participation by Tambouris, Efthimios. Publication: . X, 171 p. 38 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Software Engineering for Resilient Systems by Avgeriou, Paris. Publication: . X, 181 p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Search Based Software Engineering by Fraser, Gordon. Publication: . XVI, 293 p. 80 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Keromytis, Angelos D. Publication: . XI, 416 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Business Process Management by Barros, Alistair. Publication: . XV, 354 p. 128 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية