//]]>
Preserving Privacy in Data Outsourcing by Foresti, Sara. Publication: . XV, 180 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Tile-Based Geospatial Information Systems by Sample, John T. Publication: . XIV, 237p. 86 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Practical Studies in E-Government by Assar, Saïd. Publication: . X, 251p. 15 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Systems Development by Song, William Wei. Publication: . XXX, 578p. 106 illus., 68 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Canadian Semantic Web by Du, Weichang. Publication: . XV, 217p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Grids and Service-Oriented Architectures for Service Level Agreements by Wieder, Philipp. Publication: . XIII, 171p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Queueing Theory for Telecommunications by Alfa, Attahiru Sule. Publication: . XI, 247p. 100 illus., 50 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Statistical Image Processing and Multidimensional Modeling by Fieguth, Paul. Publication: . XXII, 454 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Evolving Towards the Internetworked Enterprise by Passiante, Giuseppina. Publication: . XI, 213p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The P=NP Question and Gödel’s Lost Letter by Lipton, Richard J. Publication: . XIII, 239p. 20 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Composing Software Components by Hamlet, Dick. Publication: . XVII, 368p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Handbook of Social Network Technologies and Applications by Furht, Borko. Publication: . XVIII, 716p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Insider Threats in Cyber Security by Probst, Christian W. Publication: . XII, 244 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Specification and Verification of Multi-agent Systems by Dastani, Mehdi. Publication: . XVII, 405p. 100 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Terminological Ontologies by Lacasta, Javier. Publication: . XVIII, 198 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Economics of Information Security and Privacy by Moore, Tyler. Publication: . XVI, 320p. 100 illus., 50 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Open Networked "i-Learning" by Elia, Gianluca. Publication: . XXI, 195p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Grids, P2P and Services Computing by Desprez, Frédéric. Publication: . XIV, 202p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Image-Based Modeling by Quan, Long. Publication: . XVIII, 251p. 67 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Adaptive Cryptographic Access Control by Kayem, Anne V. D. M. Publication: . XIV, 138 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart