//]]>
Human-Computer Interaction. Interaction Modalities and Techniques by Kurosu, Masaaki. Publication: . XXIV, 768 p. 395 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Human-Computer Interaction. Users and Contexts of Use by Kurosu, Masaaki. Publication: . XXII, 514 p. 171 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data and Applications Security and Privacy XXVII by Wang, Lingyu. Publication: . XIV, 305 p. 71 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ad-hoc, Mobile, and Wireless Network by Cichoń, Jacek. Publication: . XIV, 329 p. 150 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Detection of Intrusions and Malware, and Vulnerability Assessment by Rieck, Konrad. Publication: . XII, 207 p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Human Interface and the Management of Information. Information and Interaction for Learning, Culture, Collaboration and Business, by Yamamoto, Sakae. Publication: . XXIII, 665 p. 325 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Human Interface and the Management of Information. Information and Interaction for Health, Safety, Mobility and Complex Environments by Yamamoto, Sakae. Publication: . XXIII, 619 p. 314 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automata, Languages, and Programming by Fomin, Fedor V. Publication: . XXVI, 698 p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automata, Languages, and Programming by Fomin, Fedor V. Publication: . XXVI, 854 p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
E-Voting and Identify by Heather, James. Publication: . X, 211 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cross-Cultural Design. Cultural Differences in Everyday Life by Rau, P. L. Patrick. Publication: . XXVIII, 488 p. 144 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Symbolic and Quantitative Approaches to Reasoning with Uncertainty by Gaag, Linda C. Publication: . XII, 536 p. 62 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy Enhancing Technologies by Cristofaro, Emiliano. Publication: . X, 265 p. 88 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Human Factors in Computing and Informatics by Holzinger, Andreas. Publication: . XXIV, 845 p. 294 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Software Architecture by Drira, Khalil. Publication: . XVI, 354 p. 133 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Modelling Foundations and Applications by Gorp, Pieter. Publication: . X, 237 p. 93 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Emerging Management Mechanisms for the Future Internet by Doyen, Guillaume. Publication: . XVI, 161 p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Cryptography and Network Security by Jacobson, Michael. Publication: . XIV, 572 p. 115 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
SDL 2013: Model-Driven Dependability Engineering by Khendek, Ferhat. Publication: . XII, 291 p. 138 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust and Trustworthy Computing by Huth, Michael. Publication: . XIV, 278 p. 85 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية