//]]>
Financial Cryptography and Data Security by Sion, Radu. Publication: . X, 257p. 33 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Identity Theft by van der Meulen, Nicole S. Publication: . XIV, 306 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cybercrimes: A Multidisciplinary Analysis by Ghosh, Sumit. Publication: . XIX, 414p. 7 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
CyberForensics by Bayuk, Jennifer. Publication: . XIV, 170 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Targeted Advertising Technologies in the ICT Space by Schlee, Christian. Publication: . XXVI, 339 p. 80 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
IT Enabled Services by Uesugi, Shiro. Publication: . IX, 247 p. 77 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mobile Payment by Lerner, Thomas. Publication: . X, 180 p. 94 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Internet of Products by Neumann, Robert. Publication: . XXI, 263 p. 78 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Secure ICT Service Provisioning for Cloud, Mobile and Beyond by Faber, Eberhard. Publication: . XIII, 284 p. 94 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Frontiers in Internet Technologies by Su, Jinshu. Publication: . XII, 277 p. 132 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Modern Cryptography Primer by Kościelny, Czesław. Publication: . XIV, 238 p. 97 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets by David, Esther. Publication: . XII, 161 p. 44 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Introduction to Public Key Infrastructures by Buchmann, Johannes A. Publication: . XV, 194 p. 146 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security in Computing and Communications by Thampi, Sabu M. Publication: . XVI, 404 p. 149 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Digital Forensics and Cyber Crime by Rogers, Marcus. Publication: . XIV, 329 p. 93 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
E-Commerce and Web Technologies by Huemer, Christian. Publication: . XIV, 211 p. 71 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Co-created Effective, Agile, and Trusted eServices by Järveläinen, Jonna. Publication: . XVIII, 163 p. 30 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web Information Retrieval by Ceri, Stefano. Publication: . XIV, 284 p. 113 illus., 3 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ontology Matching by Euzenat, Jérôme. Publication: . XVII, 511 p. 103 illus., 1 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Context-Aware Systems and Applications by Vinh, Phan Cong. Publication: . XIV, 358 p. 138 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية