|
|
Voice over IP Security
by Keromytis, Angelos D.
Publication:
. XIII, 83p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ranking Queries on Uncertain Data
by Hua, Ming.
Publication:
. XVI, 224 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Change Management for Semantic Web Services
by Liu, Xumin.
Publication:
. X, 200p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Principles of Distributed Database Systems, Third Edition
by Özsu, M. Tamer.
Publication:
. XIX, 845p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service Composition for the Semantic Web
by Medjahed, Brahim.
Publication:
. XV, 191p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Social Network Data Analytics
by Aggarwal, Charu C.
Publication:
. XIV, 502p. 100 illus., 50 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Real-Time Systems
by Kopetz, Hermann.
Publication:
. XVIII, 378 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Driven e-Science
by Lin, Simon C.
Publication:
. XXII, 517p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Universal Navigation on Smartphones
by Karimi, Hassan A.
Publication:
. X, 157p. 82 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Quantum Attacks on Public-Key Cryptosystems
by Yan, Song Y.
Publication:
. VIII, 207 p. 39 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Linking Enterprise Data
by Wood, David.
Publication:
. XXVI, 291p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Canadian Semantic Web
by Du, Weichang.
Publication:
. XV, 217p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Grids and Service-Oriented Architectures for Service Level Agreements
by Wieder, Philipp.
Publication:
. XIII, 171p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Queueing Theory for Telecommunications
by Alfa, Attahiru Sule.
Publication:
. XI, 247p. 100 illus., 50 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Evolving Towards the Internetworked Enterprise
by Passiante, Giuseppina.
Publication:
. XI, 213p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Handbook of Social Network Technologies and Applications
by Furht, Borko.
Publication:
. XVIII, 716p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Insider Threats in Cyber Security
by Probst, Christian W.
Publication:
. XII, 244 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Terminological Ontologies
by Lacasta, Javier.
Publication:
. XVIII, 198 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Economics of Information Security and Privacy
by Moore, Tyler.
Publication:
. XVI, 320p. 100 illus., 50 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Open Networked "i-Learning"
by Elia, Gianluca.
Publication:
. XXI, 195p.
Availability:
Copies available:
AUM Main Library
(1),
|
|