|
|
Moving Target Defense
by Jajodia, Sushil.
Publication:
. XVI, 184 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Hard Real-Time Computing Systems
by Buttazzo, Giorgio C.
Publication:
. XVI, 524 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Scalable Network Monitoring in High Speed Networks
by Choi, Baek-Young.
Publication:
. XV, 148p. 76 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advanced Network Programming – Principles and Techniques
by Ciubotaru, Bogdan.
Publication:
. XVI, 250 p. 72 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
An Introduction to Network Programming with Java
by Graba, Jan.
Publication:
. XII, 380 p. 84 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Botnets
by Tiirmaa-Klaar, Heli.
Publication:
. VIII, 97 p. 5 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Graph Algorithms for Computer Networks
by Erciyes, K.
Publication:
. XVIII, 324 p. 167 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Next-Generation Wireless Technologies
by Chilamkurti, Naveen.
Publication:
. X, 285 p. 92 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cloud Computing
by Mahmood, Zaigham.
Publication:
. XVII, 347 p. 97 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Software Engineering Frameworks for the Cloud Computing Paradigm
by Mahmood, Zaigham.
Publication:
. XVIII, 365 p. 112 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Guide to Voice and Video over IP
by Sun, Lingfen.
Publication:
. XII, 269 p. 204 illus., 5 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Web Proxy Cache Replacement Strategies
by ElAarag, Hala.
Publication:
. X, 103 p. 81 illus., 15 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Social Media Retrieval
by Ramzan, Naeem.
Publication:
. XI, 484 p. 114 illus., 5 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Guide to Computer Network Security
by Kizza, Joseph Migga.
Publication:
. XXIV, 521 p. 106 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Energy-Efficient High Performance Computing
by Laros III, James H.
Publication:
. XIV, 67 p. 19 illus., 8 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Guide to Cisco Routers Configuration
by Alani, Mohammed M.
Publication:
. X, 80 p. 5 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Self-* and P2P for Network Management
by Marquezan, Clarissa Cassales.
Publication:
. XIII, 105 p. 22 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Decentralized Reasoning in Ambient Intelligence
by Viterbo, José.
Publication:
. IX, 96 p. 25 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Social Networks
by Abraham, Ajith.
Publication:
. XIV, 385 p. 143 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Social Networks
by Abraham, Ajith.
Publication:
. XIII, 347 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|