//]]>
Information Computing and Applications by Zhu, Rongbo. Publication: . XXIV, 530p. 170 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy in Communication Networks by Jajodia, Sushil. Publication: . XIII, 500p. 160 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web Application Security by Serrão, Carlos. Publication: . X, 83p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Life System Modeling and Intelligent Computing by Li, Kang. Publication: . XVIII, 255p. 113 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Life System Modeling and Intelligent Computing by Li, Kang. Publication: . XVIII, 261p. 132 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information and Communication Technologies by Das, Vinu V. Publication: . XVIII, 704p. 359 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Global Security, Safety, and Sustainability by Tenreiro de Magalhães, Sérgio. Publication: . XI, 301p. 84 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Digital Forensics VI by Chow, Kam-Pui. Publication: . XVIII, 311p. 76 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience by Berleur, Jacques. Publication: . XVI, 398 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Communications: Wireless in Developing Countries and Networks of the Future by Pont, Ana. Publication: . XIV, 265p. 96 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms Unplugged by Vöcking, Berthold. Publication: . X, 406p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Introduction to Reliable and Secure Distributed Programming by Cachin, Christian. Publication: . XIX, 320p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy – Silver Linings in the Cloud by Rannenberg, Kai. Publication: . XVII, 312 p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theoretical Computer Science by Calude, Cristian S. Publication: . XII, 387p. 62 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed, Parallel and Biologically Inspired Systems by Hinchey, Mike. Publication: . XVI, 316p. 113 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Contemporary Computing by Ranka, Sanjay. Publication: . XXIV, 613p. 264 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Intelligent Computing Theories and Applications by Huang, De-Shuang. Publication: . XVI, 580p. 243 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Contemporary Computing by Ranka, Sanjay. Publication: . XXIV, 275p. 134 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Matters Computational by Arndt, Jörg. Publication: . XIV, 978p. 475 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Recent Trends in Network Security and Applications by Meghanathan, Natarajan. Publication: . 651p. 286 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart