//]]>
Canadian Semantic Web by Du, Weichang. Publication: . XV, 217p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Handbook of Social Network Technologies and Applications by Furht, Borko. Publication: . XVIII, 716p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Insider Threats in Cyber Security by Probst, Christian W. Publication: . XII, 244 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Economics of Information Security and Privacy by Moore, Tyler. Publication: . XVI, 320p. 100 illus., 50 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Grids, P2P and Services Computing by Desprez, Frédéric. Publication: . XIV, 202p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Adaptive Cryptographic Access Control by Kayem, Anne V. D. M. Publication: . XIV, 138 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Association Rule Hiding for Data Mining by Gkoulalas-Divanis, Aris. Publication: . XX, 138p. 120 illus., 60 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Managed Grids and Cloud Systems in the Asia-Pacific Research Community by Lin, Simon C. Publication: . XIV, 359p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Open Source Software for Digital Forensics by Huebner, Ewa. Publication: . VII, 117p. 40 illus., 20 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Domain Driven Data Mining by Cao, Longbing. Publication: . XIII, 237p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multi-Modal User Interactions in Controlled Environments by Djeraba, Chaabane. Publication: . XVI, 216p. 40 illus., 20 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cyber Situational Awareness by Jajodia, Sushil. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Encryption for Digital Content by Kiayias, Aggelos. Publication: . XIII, 209 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
International Handbook of Internet Research by Hunsinger, Jeremy. Publication: . XX, 512p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transparent User Authentication by Clarke, Nathan. Publication: . XVIII, 229p. 98 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Guide to e-Science by Yang, Xiaoyu. Publication: . XXVIII, 540 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Social Media Modeling and Computing by Hoi, Steven C.H. Publication: . VIII, 276p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Systems Safety by Dale, Chris. Publication: . X, 315p. 62 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Elements of Computer Security by Salomon, David. Publication: . XX, 375p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network Intrusion Detection and Prevention by Ghorbani, Ali A. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart