//]]>
Quantitative Security Risk Assessment of Enterprise Networks by Ou, Xinming. Publication: . XIII, 28p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mobile Intention Recognition by Kiefer, Peter. Publication: . XVI, 168 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Effects of Traffic Structure on Application and Network Performance by Aikat, Jay. Publication: . VIII, 298 p. 394 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Linking Government Data by Wood, David. Publication: . XX, 232 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Semantic Web Services for Web Databases by Ouzzani, Mourad. Publication: . XXI, 134p. 33 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service Level Agreements for Cloud Computing by Wieder, Philipp. Publication: . XXVI, 358 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intermittently Connected Mobile Ad Hoc Networks by Jamalipour, Abbas. Publication: . XVIII, 110p. 30 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Bootstrapping Trust in Modern Computers by Parno, Bryan. Publication: . IX, 101p. 10 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Science by Blum, Edward K. Publication: . X, 470 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Communicating with XML by Salminen, Airi. Publication: . XIV, 226 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Moving Target Defense by Jajodia, Sushil. Publication: . XVI, 184 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Hard Real-Time Computing Systems by Buttazzo, Giorgio C. Publication: . XVI, 524 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Scalable Network Monitoring in High Speed Networks by Choi, Baek-Young. Publication: . XV, 148p. 76 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
CAN System Engineering by Lawrenz, Wolfhard. Publication: . XXV, 353 p. 186 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Middleware Solutions for the Internet of Things by Delicato, Flávia C. Publication: . X, 78 p. 39 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Network Programming – Principles and Techniques by Ciubotaru, Bogdan. Publication: . XVI, 250 p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
An Introduction to Network Programming with Java by Graba, Jan. Publication: . XII, 380 p. 84 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Botnets by Tiirmaa-Klaar, Heli. Publication: . VIII, 97 p. 5 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Graph Algorithms for Computer Networks by Erciyes, K. Publication: . XVIII, 324 p. 167 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Next-Generation Wireless Technologies by Chilamkurti, Naveen. Publication: . X, 285 p. 92 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Refine your search