//]]>
Information Security and Privacy by Boyd, Colin. Publication: . XII, 437 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Software Architecture by Drira, Khalil. Publication: . XVI, 354 p. 133 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Modelling Foundations and Applications by Gorp, Pieter. Publication: . X, 237 p. 93 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Emerging Management Mechanisms for the Future Internet by Doyen, Guillaume. Publication: . XVI, 161 p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Cryptography and Network Security by Jacobson, Michael. Publication: . XIV, 572 p. 115 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
SDL 2013: Model-Driven Dependability Engineering by Khendek, Ferhat. Publication: . XII, 291 p. 138 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust and Trustworthy Computing by Huth, Michael. Publication: . XIV, 278 p. 85 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory and Practice of Model Transformations by Duddy, Keith. Publication: . XIV, 221 p. 85 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Frontiers in Algorithmics and Algorithmic Aspects in Information and Management by Fellows, Michael. Publication: . XII, 364 p. 97 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Pattern Languages of Programming III by Noble, James. Publication: . X, 195 p. 42 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network and System Security by Lopez, Javier. Publication: . XX, 793 p. 207 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Post-Quantum Cryptography by Gaborit, Philippe. Publication: . X, 259 p. 17 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Business Process Models. Change Management by Gerth, Christian. Publication: . XVI, 218 p. 125 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web Services and Formal Methods by Beek, Maurice H. Publication: . X, 151 p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Infocomm Technology by Guyot, Vincent. Publication: . XVI, 358 p. 153 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Future Internet by Galis, Alex. Publication: . XLIV, 369 p. 131 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Practice and Experience by Deng, Robert H. Publication: . XIV, 388 p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Smart Grid Security by Cuellar, Jorge. Publication: . VIII, 151 p. 39 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Trust Management by Jøsang, Audun. Publication: . X, 321 p. 74 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented Computing - ICSOC 2012 Workshops by Ghose, Aditya. Publication: . XVI, 466 p. 153 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية