|
|
On the Performance of Web Services
by Tari, Zahir.
Publication:
. XII, 244p. 101 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Quantitative Security Risk Assessment of Enterprise Networks
by Ou, Xinming.
Publication:
. XIII, 28p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Energy-Efficient High Performance Computing
by Laros III, James H.
Publication:
. XIV, 67 p. 19 illus., 8 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy and Security for Cloud Computing
by Pearson, Siani.
Publication:
. XVI, 306 p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Guide to Reliable Distributed Systems
by Birman, Kenneth P.
Publication:
. XXII, 730 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Composing Software Components
by Hamlet, Dick.
Publication:
. XVII, 368p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Adaptive Cryptographic Access Control
by Kayem, Anne V. D. M.
Publication:
. XIV, 138 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Association Rule Hiding for Data Mining
by Gkoulalas-Divanis, Aris.
Publication:
. XX, 138p. 120 illus., 60 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|