|
|
Benchmarking Peer-to-Peer Systems
by Effelsberg, Wolfgang.
Publication:
. VIII, 197 p. 57 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network and System Security
by Lopez, Javier.
Publication:
. XX, 793 p. 207 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Web-Age Information Management
by Wang, Jianyong.
Publication:
. XXVIII, 812 p. 326 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Applications and Interoperable Systems
by Dowling, Jim.
Publication:
. XII, 205 p. 75 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Wired/Wireless Internet Communication
by Tsaoussidis, Vassilis.
Publication:
. XII, 277 p. 145 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advanced Infocomm Technology
by Guyot, Vincent.
Publication:
. XVI, 358 p. 153 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Future Internet
by Galis, Alex.
Publication:
. XLIV, 369 p. 131 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Smart Card Research and Advanced Applications
by Mangard, Stefan.
Publication:
. XII, 297 p. 98 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Social Computing, Behavioral-Cultural Modeling and Prediction
by Greenberg, Ariel M.
Publication:
. XVI, 535 p. 166 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Databases in Networked Information Systems
by Madaan, Aastha.
Publication:
. XII, 311 p. 139 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Web and Wireless Geographical Information Systems
by Liang, Steve H. L.
Publication:
. X, 223 p. 103 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Principles of Security and Trust
by Basin, David.
Publication:
. XX, 287 p. 34 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information and Communication Technology
by Mustofa, Khabib.
Publication:
. XVI, 552 p. 170 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Traffic Monitoring and Analysis
by Biersack, Ernst.
Publication:
. XVI, 359 p. 121 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
System Analysis and Modeling: Theory and Practice
by Haugen, Øystein.
Publication:
. X, 249 p. 91 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Process Support and Knowledge Representation in Health Care
by Lenz, Richard.
Publication:
. XIV, 183 p. 48 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Architecture of Computing Systems – ARCS 2013
by Kubátová, Hana.
Publication:
. XIV, 354 p. 146 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Protocols XVII
by Christianson, Bruce.
Publication:
. X, 367 p. 28 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Radio Frequency Identification. Security and Privacy Issues
by Hoepman, Jaap-Henk.
Publication:
. X, 181 p. 37 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Computing and Internet Technology
by Hota, Chittaranjan.
Publication:
. XIV, 574 p. 189 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|