//]]>
Cooperating embedded systems and wireless sensor networks /   Publication: London : ISTE, 2008 . 418 p. : 25 cm. Date:2008 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Next Generation Data Technologies for Collective Computational Intelligence by Bessis, Nik. Publication: . XVIII, 638 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Control and Optimization Methods for Electric Smart Grids by Chakrabortty, Aranya. Publication: . XVI, 372 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network and Parallel Computing by Park, James J. Publication: . XX, 647 p. 253 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Secure IT Systems by Jøsang, Audun. Publication: . X, 247 p. 62 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented Computing by Maglio, Paul P. Publication: . XX, 737p. 285 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Security – ESORICS 2010 by Gritzalis, Dimitris. Publication: . XIV, 718p. 163 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligent Information and Database Systems by Nguyen, Ngoc Thanh. Publication: . XXIII, 477p. 196 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Complex Intelligent Systems and Their Applications by Xhafa, Fatos. Publication: . XIV, 274 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthy Ubiquitous Computing by Khalil, Ismail. Publication: . XIX, 267 p. 117 illus., 47 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cyber Security and Privacy by Felici, Massimo. Publication: . XIV, 177 p. 44 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Understanding High-Dimensional Spaces by Skillicorn, David B. Publication: . IX, 108 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Information Security by Basin, David. Publication: . XIV, 202 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mobile Wireless Middleware, Operating Systems, and Applications by Cai, Ying. Publication: . XVI, 508p. 209 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service Oriented Infrastructures and Cloud Service Platforms for the Enterprise by Dimitrakos, Theo. Publication: . XV, 210 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Analysis of Terrorist Groups: Lashkar-e-Taiba by Subrahmanian, V.S. Publication: . XIV, 231 p. 23 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Economics of Information Security and Privacy III by Schneier, Bruce. Publication: . X, 283 p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network Intrusion Detection and Prevention by Ghorbani, Ali A. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Introduction to Biometrics by Jain, Anil K. Publication: . XVI, 312 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Managing Risk and Information Security by Harkins, Malcolm. Publication: . XVII, 152 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية