//]]>
Interactive Theorem Proving by Blazy, Sandrine. Publication: . XII, 498 p. 73 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Detection of Intrusions and Malware, and Vulnerability Assessment by Rieck, Konrad. Publication: . XII, 207 p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
E-Voting and Identify by Heather, James. Publication: . X, 211 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems by Cavallaro, Lorenzo. Publication: . XVI, 145 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Smart Card Research and Advanced Applications by Mangard, Stefan. Publication: . XII, 297 p. 98 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Radio Frequency Identification. Security and Privacy Issues by Hoepman, Jaap-Henk. Publication: . X, 181 p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Computing and Networking by Frey, Davide. Publication: . XX, 466 p. 121 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Programming Languages and Systems by Jhala, Ranjit. Publication: . XII, 389 p. 104 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Internet and Distributed Computing Systems by Xiang, Yang. Publication: . XIV, 289 p. 182 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Safety, Reliability, and Security by Ortmeier, Frank. Publication: . XVIII, 402 p. 138 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Safety, Reliability, and Security by Ortmeier, Frank. Publication: . XVI, 530 p. 198 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
On the Move to Meaningful Internet Systems: OTM 2012 by Meersman, Robert. Publication: . XXV, 485 p. 135 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
On the Move to Meaningful Internet Systems: OTM 2012 by Meersman, Robert. Publication: . XXVI, 467 p. 202 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Stabilization, Safety, and Security of Distributed Systems by Richa, Andréa W. Publication: . XIX, 330 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented and Cloud Computing by Paoli, Flavio. Publication: . XI, 282 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security by Gollmann, Dieter. Publication: . XIV, 402 p. 87 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Security – ESORICS 2012 by Foresti, Sara. Publication: . XVII, 896 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
E-Voting and Identity by Kiayias, Aggelos. Publication: . X, 257 p. 26 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Convergence and Hybrid Information Technology by Lee, Geuk. Publication: . XX, 763 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Business System Management and Engineering by Ardagna, Claudio A. Publication: . X, 197 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 4 5 Next >>

Languages: 
English |
العربية