//]]>
Agent and Multi-Agent Systems. Technologies and Applications by Jezic, Gordan. Publication: . XVII, 661p. 226 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Danezis, George. Publication: . XII, 185 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Technology for Applications by Aura, Tuomas. Publication: . X, 289 p. 73 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithmic Game Theory by Persiano, Giuseppe. Publication: . XI, 327p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Economics of Converged, Internet-Based Networks by Cohen, Johanne. Publication: . IX, 75p. 25 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Human Interface and the Management of Information. Interacting with Information by Smith, Michael J. Publication: . XXX, 673p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Human-Computer Interaction. Users and Applications by Jacko, Julie A. Publication: . XXIV, 711 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithmic Game Theory by Kontogiannis, Spyros. Publication: . VIII, 359p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Sion, Radu. Publication: . X, 257p. 33 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية