|
|
Economics of Information Security and Privacy III
by Schneier, Bruce.
Publication:
. X, 283 p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Design of Cloud Workflow Systems
by Liu, Xiao.
Publication:
. XIV, 97p. 33 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
On the Performance of Web Services
by Tari, Zahir.
Publication:
. XII, 244p. 101 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Economics of Financial and Medical Identity Theft
by Camp, L. Jean.
Publication:
. XI, 166p. 10 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
A Primer of Multicast Routing
by Rosenberg, Eric.
Publication:
. X, 117p. 58 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Quantitative Security Risk Assessment of Enterprise Networks
by Ou, Xinming.
Publication:
. XIII, 28p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mobile Intention Recognition
by Kiefer, Peter.
Publication:
. XVI, 168 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Effects of Traffic Structure on Application and Network Performance
by Aikat, Jay.
Publication:
. VIII, 298 p. 394 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Semantic Web Services for Web Databases
by Ouzzani, Mourad.
Publication:
. XXI, 134p. 33 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service Level Agreements for Cloud Computing
by Wieder, Philipp.
Publication:
. XXVI, 358 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intermittently Connected Mobile Ad Hoc Networks
by Jamalipour, Abbas.
Publication:
. XVIII, 110p. 30 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Bootstrapping Trust in Modern Computers
by Parno, Bryan.
Publication:
. IX, 101p. 10 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Science
by Blum, Edward K.
Publication:
. X, 470 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Moving Target Defense
by Jajodia, Sushil.
Publication:
. XVI, 184 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Hard Real-Time Computing Systems
by Buttazzo, Giorgio C.
Publication:
. XVI, 524 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Scalable Network Monitoring in High Speed Networks
by Choi, Baek-Young.
Publication:
. XV, 148p. 76 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advanced Network Programming – Principles and Techniques
by Ciubotaru, Bogdan.
Publication:
. XVI, 250 p. 72 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
An Introduction to Network Programming with Java
by Graba, Jan.
Publication:
. XII, 380 p. 84 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Botnets
by Tiirmaa-Klaar, Heli.
Publication:
. VIII, 97 p. 5 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Graph Algorithms for Computer Networks
by Erciyes, K.
Publication:
. XVIII, 324 p. 167 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|