//]]>
Enterprise Interoperability V by Poler, Raúl. Publication: . XIII, 479p. 172 illus., 125 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Innovative Tools for Business Coalitions in B2B Applications by Argoneto, Pierluigi. Publication: . IX, 160p. 38 illus., 13 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented Computing by Basu, Samik. Publication: . XVIII, 713 p. 260 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
PRIMA 2013: Principles and Practice of Multi-Agent Systems by Boella, Guido. Publication: . XVIII, 536 p. 158 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Adams, Andrew A. Publication: . XII, 239 p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Research in Attacks, Intrusions, and Defenses by Stolfo, Salvatore J. Publication: . XII, 476 p. 139 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Provable Security by Susilo, Willy. Publication: . X, 347 p. 36 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Communications and Multimedia Security by Decker, Bart. Publication: . XIV, 249 p. 83 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented and Cloud Computing by Lau, Kung-Kiu. Publication: . X, 244 p. 80 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Availability, Reliability, and Security in Information Systems and HCI by Cuzzocrea, Alfredo. Publication: . XVI, 504 p. 156 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mobile Web Information Systems by Daniel, Florian. Publication: . XVI, 306 p. 94 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Security – ESORICS 2013 by Crampton, Jason. Publication: . XVIII, 794 p. 158 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Sadeghi, Ahmad-Reza. Publication: . XVI, 406 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Product-Focused Software Process Improvement by Heidrich, Jens. Publication: . XVI, 374 p. 87 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Detection of Intrusions and Malware, and Vulnerability Assessment by Rieck, Konrad. Publication: . XII, 207 p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Boyd, Colin. Publication: . XII, 437 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
User Modeling, Adaptation, and Personalization by Carberry, Sandra. Publication: . XXVI, 416 p. 120 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Design Science at the Intersection of Physical and Virtual Design by Brocke, Jan. Publication: . XVI, 528 p. 130 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Information Systems Engineering by Salinesi, Camille. Publication: . XXXVIII, 706 p. 258 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network and System Security by Lopez, Javier. Publication: . XX, 793 p. 207 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية