//]]>
Voice over IP Security by Keromytis, Angelos D. Publication: . XIII, 83p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ranking Queries on Uncertain Data by Hua, Ming. Publication: . XVI, 224 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Change Management for Semantic Web Services by Liu, Xumin. Publication: . X, 200p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Principles of Distributed Database Systems, Third Edition by Özsu, M. Tamer. Publication: . XIX, 845p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service Composition for the Semantic Web by Medjahed, Brahim. Publication: . XV, 191p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Social Network Data Analytics by Aggarwal, Charu C. Publication: . XIV, 502p. 100 illus., 50 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Real-Time Systems by Kopetz, Hermann. Publication: . XVIII, 378 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Driven e-Science by Lin, Simon C. Publication: . XXII, 517p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Universal Navigation on Smartphones by Karimi, Hassan A. Publication: . X, 157p. 82 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Quantum Attacks on Public-Key Cryptosystems by Yan, Song Y. Publication: . VIII, 207 p. 39 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Linking Enterprise Data by Wood, David. Publication: . XXVI, 291p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Canadian Semantic Web by Du, Weichang. Publication: . XV, 217p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Grids and Service-Oriented Architectures for Service Level Agreements by Wieder, Philipp. Publication: . XIII, 171p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Queueing Theory for Telecommunications by Alfa, Attahiru Sule. Publication: . XI, 247p. 100 illus., 50 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Evolving Towards the Internetworked Enterprise by Passiante, Giuseppina. Publication: . XI, 213p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Handbook of Social Network Technologies and Applications by Furht, Borko. Publication: . XVIII, 716p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Insider Threats in Cyber Security by Probst, Christian W. Publication: . XII, 244 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Terminological Ontologies by Lacasta, Javier. Publication: . XVIII, 198 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Economics of Information Security and Privacy by Moore, Tyler. Publication: . XVI, 320p. 100 illus., 50 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Open Networked "i-Learning" by Elia, Gianluca. Publication: . XXI, 195p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Refine your search