//]]>
Benchmarking Peer-to-Peer Systems by Effelsberg, Wolfgang. Publication: . VIII, 197 p. 57 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network and System Security by Lopez, Javier. Publication: . XX, 793 p. 207 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web-Age Information Management by Wang, Jianyong. Publication: . XXVIII, 812 p. 326 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Applications and Interoperable Systems by Dowling, Jim. Publication: . XII, 205 p. 75 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Wired/Wireless Internet Communication by Tsaoussidis, Vassilis. Publication: . XII, 277 p. 145 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Infocomm Technology by Guyot, Vincent. Publication: . XVI, 358 p. 153 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Future Internet by Galis, Alex. Publication: . XLIV, 369 p. 131 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Smart Card Research and Advanced Applications by Mangard, Stefan. Publication: . XII, 297 p. 98 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Social Computing, Behavioral-Cultural Modeling and Prediction by Greenberg, Ariel M. Publication: . XVI, 535 p. 166 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Databases in Networked Information Systems by Madaan, Aastha. Publication: . XII, 311 p. 139 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web and Wireless Geographical Information Systems by Liang, Steve H. L. Publication: . X, 223 p. 103 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Principles of Security and Trust by Basin, David. Publication: . XX, 287 p. 34 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information and Communication Technology by Mustofa, Khabib. Publication: . XVI, 552 p. 170 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Traffic Monitoring and Analysis by Biersack, Ernst. Publication: . XVI, 359 p. 121 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
System Analysis and Modeling: Theory and Practice by Haugen, Øystein. Publication: . X, 249 p. 91 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Process Support and Knowledge Representation in Health Care by Lenz, Richard. Publication: . XIV, 183 p. 48 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Architecture of Computing Systems – ARCS 2013 by Kubátová, Hana. Publication: . XIV, 354 p. 146 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols XVII by Christianson, Bruce. Publication: . X, 367 p. 28 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Radio Frequency Identification. Security and Privacy Issues by Hoepman, Jaap-Henk. Publication: . X, 181 p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Computing and Internet Technology by Hota, Chittaranjan. Publication: . XIV, 574 p. 189 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart