//]]>
Computing with Instinct by Cai, Yang. Publication: . XIII, 163 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Aspects of Security and Trust by Degano, Pierpaolo. Publication: . X, 239 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Social Computing, Behavioral-Cultural Modeling and Prediction by Salerno, John. Publication: . XIII, 384 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Selected Areas in Cryptography by Biryukov, Alex. Publication: . XIII, 411 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Rainbow of Computer Science by Calude, Cristian S. Publication: . XII, 285p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Privacy Management and Autonomous Spontaneous Security by Garcia-Alfaro, Joaquin. Publication: . XIV, 259 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Passive and Active Measurement by Spring, Neil. Publication: . XI, 246 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Open Research Problems in Network Security by Camenisch, Jan. Publication: . VIII, 171 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Architecture of Computing Systems - ARCS 2011 by Berekovic, Mladen. Publication: . XIII, 271p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Digital Privacy by Camenisch, Jan. Publication: . Approx. 800 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Edutainment V by Pan, Zhigeng. Publication: . X, 271 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Human-Computer Interaction, Tourism and Cultural Heritage by Cipolla Ficarra, Francisco V. Publication: . VIII, 195p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Toward Autonomous, Adaptive, and Context-Aware Multimodal Interfaces. Theoretical and Practical Issues by Esposito, Anna. Publication: . XXII, 474p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Applications by Chung, Yongwha. Publication: . XIII, 352p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Provenance and Annotation of Data and Processes by McGuinness, Deborah L. Publication: . XII, 306p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols by Christianson, Bruce. Publication: . VIII, 257p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Semantic Web – ISWC 2010 by Patel-Schneider, Peter F. Publication: . XXI, 833p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Web-Based Learning – ICWL 2010 by Luo, Xiangfeng. Publication: . XIV, 412p. 57 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Social Robotics by Ge, Shuzhi Sam. Publication: . XV, 412p. 182 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Methods for Components and Objects by Boer, Frank S. Publication: . X, 339p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية