|
|
High Performance Networking, Computing, and Communication Systems
by Wu, Yanwen.
Publication:
. XV, 617 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theoretical and Mathematical Foundations of Computer Science
by Zhou, Qihai.
Publication:
. XV, 615 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Information Security
by Basin, David.
Publication:
. XIV, 202 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptographic Protocol
by Dong, Ling.
Publication:
. 250p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Programming for Engineers
by Bradley, Aaron R.
Publication:
. XIV, 238 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Informatics and Communication
by Zhang, Jianwei.
Publication:
. XIII, 699 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Informatics and Communication
by Zhang, Jun.
Publication:
. XIV, 727 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Informatics and Communication
by Zhang, Jun.
Publication:
. XIV, 689 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Informatics and Communication
by Zeng, Dehuai.
Publication:
. XIV, 745 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Informatics and Communication
by Zeng, Dehuai.
Publication:
. XIII, 753 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Assurance
by Kim, Tai-hoon.
Publication:
. XIV, 406p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Analysis of Rare Categories
by He, Jingrui.
Publication:
. VIII, 136 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Multimedia Communications, Services and Security
by Dziech, Andrzej.
Publication:
. XIV, 354 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Software and Data Technologies
by Cordeiro, José.
Publication:
. XIII, 291p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
e-Business and Telecommunications
by Obaidat, Mohammad S.
Publication:
. XVII, 359p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Securing Digital Video
by Diehl, Eric.
Publication:
. X, 264 p. 99 illus., 11 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Block Cipher Companion
by Knudsen, Lars R.
Publication:
. XIV, 270 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Policies and Research in Identity Management
by Leeuw, Elisabeth.
Publication:
. X, 145p. 39 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Infrastructure Protection IV
by Moore, Tyler.
Publication:
. XVIII, 260p. 86 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Towards Hardware-Intrinsic Security
by Sadeghi, Ahmad-Reza.
Publication:
. XVI, 407 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|