|
|
Product-Focused Software Process Improvement
by Dieste, Oscar.
Publication:
. XVI, 378p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Persuasive Technology. Design for Health and Safety
by Bang, Magnus.
Publication:
. Approx. 295 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems
by Askoxylakis, Ioannis.
Publication:
. XII, 225p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligent Tutoring Systems
by Cerri, Stefano A.
Publication:
. XXXIV, 726p. 159 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Agent and Multi-Agent Systems. Technologies and Applications
by Jezic, Gordan.
Publication:
. XVII, 661p. 226 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust and Trustworthy Computing
by Katzenbeisser, Stefan.
Publication:
. XII, 341p. 91 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Applications and Interoperable Systems
by Göschka, Karl Michael.
Publication:
. XII, 240p. 71 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Grid and Pervasive Computing
by Li, Ruixuan.
Publication:
. XIII, 370p. 117 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Dependable Networks and Services
by Sadre, Ramin.
Publication:
. XIII, 161 p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligence and Security Informatics
by Chau, Michael.
Publication:
. X, 207p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Telecommunication Economics
by Hadjiantonis, Antonis M.
Publication:
. IX, 243 p. 61 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Future Internet
by Álvarez, Federico.
Publication:
. XXV, 252 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Trust Management
by Meadows, Catherine.
Publication:
. X, 239p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Constructive Side-Channel Analysis and Secure Design
by Schindler, Werner.
Publication:
. Approx. 280 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Danezis, George.
Publication:
. XII, 185 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Infrastructures, Services and Applications
by Petkova-Nikova, Svetla.
Publication:
. X, 209 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Formal Aspects of Security and Trust
by Barthe, Gilles.
Publication:
. X, 279 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theorie and Applications of Formal Argumentation
by Modgil, Sanjay.
Publication:
. X, 281 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Practice and Experience
by Ryan, Mark D.
Publication:
. XIII, 406p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Edutainment VII
by Pan, Zhigeng.
Publication:
. XIII, 284 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|