|
|
Preserving Privacy in Data Outsourcing
by Foresti, Sara.
Publication:
. XV, 180 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Tile-Based Geospatial Information Systems
by Sample, John T.
Publication:
. XIV, 237p. 86 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Practical Studies in E-Government
by Assar, Saïd.
Publication:
. X, 251p. 15 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Systems Development
by Song, William Wei.
Publication:
. XXX, 578p. 106 illus., 68 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Canadian Semantic Web
by Du, Weichang.
Publication:
. XV, 217p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Grids and Service-Oriented Architectures for Service Level Agreements
by Wieder, Philipp.
Publication:
. XIII, 171p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Queueing Theory for Telecommunications
by Alfa, Attahiru Sule.
Publication:
. XI, 247p. 100 illus., 50 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Statistical Image Processing and Multidimensional Modeling
by Fieguth, Paul.
Publication:
. XXII, 454 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Evolving Towards the Internetworked Enterprise
by Passiante, Giuseppina.
Publication:
. XI, 213p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The P=NP Question and Gödel’s Lost Letter
by Lipton, Richard J.
Publication:
. XIII, 239p. 20 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Composing Software Components
by Hamlet, Dick.
Publication:
. XVII, 368p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Handbook of Social Network Technologies and Applications
by Furht, Borko.
Publication:
. XVIII, 716p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Insider Threats in Cyber Security
by Probst, Christian W.
Publication:
. XII, 244 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Specification and Verification of Multi-agent Systems
by Dastani, Mehdi.
Publication:
. XVII, 405p. 100 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Terminological Ontologies
by Lacasta, Javier.
Publication:
. XVIII, 198 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Economics of Information Security and Privacy
by Moore, Tyler.
Publication:
. XVI, 320p. 100 illus., 50 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Open Networked "i-Learning"
by Elia, Gianluca.
Publication:
. XXI, 195p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Grids, P2P and Services Computing
by Desprez, Frédéric.
Publication:
. XIV, 202p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Image-Based Modeling
by Quan, Long.
Publication:
. XVIII, 251p. 67 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Adaptive Cryptographic Access Control
by Kayem, Anne V. D. M.
Publication:
. XIV, 138 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|