//]]>
Electronic Government by Wimmer, Maria A. Publication: . XIV, 335 p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Electronic Government by Scholl, Hans J. Publication: . XIII, 279 p. 30 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligence and Security Informatics by Chau, Michael. Publication: . X, 207p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Analysis of Social Media and Ubiquitous Data by Atzmueller, Martin. Publication: . VIII, 163p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Electronic Government by Janssen, Marijn. Publication: . XVI, 466 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligence and Security Informatics by Chau, Michael. Publication: . X, 133p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Privacy Management and Autonomous Spontaneous Security by Garcia-Alfaro, Joaquin. Publication: . XII, 265p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Resistance, Liberation Technology and Human Rights in the Digital Age by Ziccardi, Giovanni. Publication: . VIII, 328 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Second Generation Biometrics: The Ethical, Legal and Social Context by Mordini, Emilio. Publication: . X, 353p. 59 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
European Data Protection: In Good Health? by Gutwirth, Serge. Publication: . XVIII, 363p. 20 illus., 10 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Legislative XML for the Semantic Web by Sartor, Giovanni. Publication: . XI, 190 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Identity Theft by van der Meulen, Nicole S. Publication: . XIV, 306 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Internet of Things by Weber, Rolf H. Publication: . XXIV, 129p. 9 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Shaping Internet Governance: Regulatory Challenges by Weber, Rolf H. Publication: . XXXIX, 280p. 4 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Infrastructure Protection VII by Butts, Jonathan. Publication: . XVI, 227 p. 68 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Open Source Software: Quality Verification by Petrinja, Etiel. Publication: . XIV, 277 p. 67 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multimedia Communications, Services and Security by Dziech, Andrzej. Publication: . XIV, 325 p. 139 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Infrastructure Protection VI by Butts, Jonathan. Publication: . XVI, 233 p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Auctions, Market Mechanisms, and Their Applications by Coles, Peter. Publication: . XII, 113 p. 16 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Forensics in Telecommunications, Information, and Multimedia by Lai, Xuejia. Publication: . XIII, 314p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية