//]]>
Product-Focused Software Process Improvement by Dieste, Oscar. Publication: . XVI, 378p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Persuasive Technology. Design for Health and Safety by Bang, Magnus. Publication: . Approx. 295 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems by Askoxylakis, Ioannis. Publication: . XII, 225p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligent Tutoring Systems by Cerri, Stefano A. Publication: . XXXIV, 726p. 159 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Agent and Multi-Agent Systems. Technologies and Applications by Jezic, Gordan. Publication: . XVII, 661p. 226 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust and Trustworthy Computing by Katzenbeisser, Stefan. Publication: . XII, 341p. 91 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Applications and Interoperable Systems by Göschka, Karl Michael. Publication: . XII, 240p. 71 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Grid and Pervasive Computing by Li, Ruixuan. Publication: . XIII, 370p. 117 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Dependable Networks and Services by Sadre, Ramin. Publication: . XIII, 161 p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligence and Security Informatics by Chau, Michael. Publication: . X, 207p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Telecommunication Economics by Hadjiantonis, Antonis M. Publication: . IX, 243 p. 61 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Future Internet by Álvarez, Federico. Publication: . XXV, 252 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Trust Management by Meadows, Catherine. Publication: . X, 239p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Constructive Side-Channel Analysis and Secure Design by Schindler, Werner. Publication: . Approx. 280 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Danezis, George. Publication: . XII, 185 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Infrastructures, Services and Applications by Petkova-Nikova, Svetla. Publication: . X, 209 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Aspects of Security and Trust by Barthe, Gilles. Publication: . X, 279 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theorie and Applications of Formal Argumentation by Modgil, Sanjay. Publication: . X, 281 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Practice and Experience by Ryan, Mark D. Publication: . XIII, 406p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Edutainment VII by Pan, Zhigeng. Publication: . XIII, 284 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية