//]]>
Data Privacy Management and Autonomous Spontaneus Security by Garcia-Alfaro, Joaquin. Publication: . XV, 319 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Architecture of Computing Systems – ARCS 2012 by Herkersdorf, Andreas. Publication: . XIII, 252 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Methods for Components and Objects by Aichernig, Bernhard K. Publication: . VII, 393p. 145 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Communications and Multimedia Security by Decker, Bart. Publication: . XIV, 257 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Dependable and Historic Computing by Jones, Cliff B. Publication: . XII, 523p. 137 illus., 60 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network and Parallel Computing by Altman, Erik. Publication: . XIII, 368 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Parallel Processing Technologies by Temam, Olivier. Publication: . 190p. 89 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Search Based Software Engineering by Cohen, Myra B. Publication: . XV, 279p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Euro-Par 2011 Parallel Processing by Jeannot, Emmanuel. Publication: . XXXIII, 598p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Euro-Par 2011 Parallel Processing by Jeannot, Emmanuel. Publication: . Approx. 490 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Parallel Computing Technologies by Malyshkin, Victor. Publication: . XIV, 500p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Energy Minimization Methods in Computer Vision and Pattern Recognition by Boykov, Yuri. Publication: . Approx. 450 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Parampalli, Udaya. Publication: . XIII, 464 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Trust Management by Cuellar, Jorge. Publication: . X, 271 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols XVI by Christianson, Bruce. Publication: . IX, 257 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – AFRICACRYPT 2011 by Nitaj, Abderrahmane. Publication: . XIII, 387p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Analytical and Stochastic Modeling Techniques and Applications by Al-Begain, Khalid. Publication: . XI, 347p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Information Infrastructures Security by Xenakis, Christos. Publication: . X, 161p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Managing the Dynamics of Networks and Services by Chrisment, Isabelle. Publication: . X, 181p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Applications and Interoperable Systems by Felber, Pascal. Publication: . XII, 304 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية