|
|
Information Security and Privacy
by Boyd, Colin.
Publication:
. XII, 437 p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Software Architecture
by Drira, Khalil.
Publication:
. XVI, 354 p. 133 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Modelling Foundations and Applications
by Gorp, Pieter.
Publication:
. X, 237 p. 93 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Emerging Management Mechanisms for the Future Internet
by Doyen, Guillaume.
Publication:
. XVI, 161 p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Cryptography and Network Security
by Jacobson, Michael.
Publication:
. XIV, 572 p. 115 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
SDL 2013: Model-Driven Dependability Engineering
by Khendek, Ferhat.
Publication:
. XII, 291 p. 138 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust and Trustworthy Computing
by Huth, Michael.
Publication:
. XIV, 278 p. 85 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory and Practice of Model Transformations
by Duddy, Keith.
Publication:
. XIV, 221 p. 85 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Frontiers in Algorithmics and Algorithmic Aspects in Information and Management
by Fellows, Michael.
Publication:
. XII, 364 p. 97 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Pattern Languages of Programming III
by Noble, James.
Publication:
. X, 195 p. 42 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network and System Security
by Lopez, Javier.
Publication:
. XX, 793 p. 207 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Post-Quantum Cryptography
by Gaborit, Philippe.
Publication:
. X, 259 p. 17 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Business Process Models. Change Management
by Gerth, Christian.
Publication:
. XVI, 218 p. 125 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Web Services and Formal Methods
by Beek, Maurice H.
Publication:
. X, 151 p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advanced Infocomm Technology
by Guyot, Vincent.
Publication:
. XVI, 358 p. 153 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Future Internet
by Galis, Alex.
Publication:
. XLIV, 369 p. 131 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Practice and Experience
by Deng, Robert H.
Publication:
. XIV, 388 p. 72 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Smart Grid Security
by Cuellar, Jorge.
Publication:
. VIII, 151 p. 39 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Trust Management
by Jøsang, Audun.
Publication:
. X, 321 p. 74 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service-Oriented Computing - ICSOC 2012 Workshops
by Ghose, Aditya.
Publication:
. XVI, 466 p. 153 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|