//]]>
Bluetooth Security Attacks by Haataja, Keijo. Publication: . VII, 93 p. 31 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Understanding High-Dimensional Spaces by Skillicorn, David B. Publication: . IX, 108 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Software Testing in the Cloud by Tilley, Scott. Publication: . XV, 103 p. 40 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
On the Mathematics of Modelling, Metamodelling, Ontologies and Modelling Languages by Henderson-Sellers, Brian. Publication: . IX, 106 p. 98 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Event-Driven Surveillance by Denecke, Kerstin. Publication: . X, 76 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Unsupervised Information Extraction by Text Segmentation by Cortez, Eli. Publication: . XV, 94 p. 25 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Sustainable Wireless Networks by Zheng, Zhongming. Publication: . IX, 59 p. 24 illus., 3 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Spatio-Temporal Databases by Vieira, Marcos R. Publication: . XIII, 114 p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cyber Security by Martellini, Maurizio. Publication: . XIV, 72 p. 10 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Center Networks by Liu, Yang. Publication: . XII, 68 p. 16 illus., 15 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Concise Computer Mathematics by Bagdasar, Ovidiu. Publication: . XII, 109 p. 17 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
A Brief History of Cryptology and Cryptographic Algorithms by Dooley, John F. Publication: . XII, 99 p. 33 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Secure IP Mobility Management for VANET by Taha, Sanaa. Publication: . IX, 106 p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Wireless Virtualization by Wen, Heming. Publication: . XIV, 112 p. 42 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Assessment in Vehicular Networks by Du, Suguo. Publication: . XI, 49 p. 9 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
4G Femtocells by Zhang, Haijun. Publication: . IX, 77 p. 21 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Location Privacy Protection in Mobile Networks by Liu, Xinxin. Publication: . XII, 75 p. 23 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Hash Table by Zhang, Hao. Publication: . VIII, 67 p. 15 illus., 3 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks by Tang, Jin. Publication: . X, 86 p. 31 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Resource Management in Utility and Cloud Computing by Zhao, Han. Publication: . XII, 82 p. 22 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 4 5 6 Next >>

Languages: 
English |
العربية