//]]>
Disclosure of Security Vulnerabilities by Maurushat, Alana. Publication: . X, 121 p. 4 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ethical and Social Issues in the Information Age by Kizza, Joseph Migga. Publication: . XVIII, 372 p. 22 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Introduction to Image Processing Using R by Frery, Alejandro C. Publication: . XV, 87 p. 42 illus., 17 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Omnidirectional Vision Systems by Puig, Luis. Publication: . XI, 122 p. 68 illus., 35 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Efficient Algorithms for Discrete Wavelet Transform by Shukla, K. K. Publication: . IX, 91 p. 46 illus., 31 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The History of Visual Magic in Computers by Peddie, Jon. Publication: . XLI, 448 p. 369 illus., 226 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Decision Forests for Computer Vision and Medical Image Analysis by Criminisi, A. Publication: . XIX, 368 p. 143 illus., 136 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Guide to Voice and Video over IP by Sun, Lingfen. Publication: . XII, 269 p. 204 illus., 5 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Visual Texture by Haindl, Michal. Publication: . XXXI, 284 p. 158 illus., 148 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web Proxy Cache Replacement Strategies by ElAarag, Hala. Publication: . X, 103 p. 81 illus., 15 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Mining in Large Sets of Complex Data by Cordeiro, Robson L. F. Publication: . XI, 116 p. 37 illus., 25 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Principles of Data Mining by Bramer, Max. Publication: . XIV, 440 p. 101 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Business Intelligence and Performance Management by Rausch, Peter. Publication: . XIV, 269 p. 85 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Reproduction of Tactual Textures by Wiertlewski, Michaël. Publication: . XIV, 133 p. 52 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Eye Gaze in Intelligent User Interfaces by Nakano, Yukiko I. Publication: . X, 207 p. 84 illus., 71 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
User Modeling and Adaptation for Daily Routines by Martín, Estefanía. Publication: . XII, 250 p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Game Analytics by Seif El-Nasr, Magy. Publication: . XV, 800 p. 222 illus., 122 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Secure Information Society by Krüger, Jörg. Publication: . X, 213 p. 41 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Cancer Biology by Vidyasagar, Mathukumalli. Publication: . XII, 80 p. 11 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Research and Development in Intelligent Systems XXIX by Bramer, Max. Publication: . XIV, 446 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart