//]]>
Service-Oriented Computing by Kappel, Gerti. Publication: . XVIII, 680 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Post-Quantum Cryptography by Yang, Bo-Yin. Publication: Berlin, Heidelberg : Springer Berlin Heidelberg, 2011 Date:2011 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – ASIACRYPT 2011 by Lee, Dong Hoon. Publication: . XIV, 760 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
RFID. Security and Privacy by Juels, Ari. Publication: . X, 260p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trusted Systems by Chen, Liqun. Publication: . XIV, 362p. 73 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Decision and Game Theory for Security by Baras, John S. Publication: . X, 259 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
SDL 2011: Integrating System and Software Modeling by Ober, Iulian. Publication: . VIII, 277p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Empirical Software Engineering and Verification by Meyer, Bertrand. Publication: . VII, 213 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Information and Computer Security by Iwata, Tetsu. Publication: . XII, 231 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
On the Move to Meaningful Internet Systems: OTM 2011 by Meersman, Robert. Publication: . XXVIII, 430 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
On the Move to Meaningful Internet Systems: OTM 2011 by Meersman, Robert. Publication: . XXVII, 407 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Methods, Foundations and Applications by Simao, Adenilso. Publication: . X, 205 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Knowledge, Information, and Creativity Support Systems by Theeramunkong, Thanaruk. Publication: . XIII, 263 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Communications and Multimedia Security by Decker, Bart. Publication: . XIV, 257 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms and Architectures for Parallel Processing by Xiang, Yang. Publication: . XVIII, 411p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms and Architectures for Parallel Processing by Xiang, Yang. Publication: . XVIII, 497p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Aspects in Information Technology by Joye, Marc. Publication: . XIV, 187p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Stabilization, Safety, and Security of Distributed Systems by Défago, Xavier. Publication: . XIV, 452 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Model Driven Engineering Languages and Systems by Whittle, Jon. Publication: . XX, 730 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Provable Security by Boyen, Xavier. Publication: . XIII, 399 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية