|
|
Passive and Active Measurement
by Taft, Nina.
Publication:
. XI, 264 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Traffic Monitoring and Analysis
by Pescapè, Antonio.
Publication:
. X, 175 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Selected Areas in Cryptography
by Miri, Ali.
Publication:
. XIII, 431 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptography and Security: From Theory to Applications
by Naccache, David.
Publication:
. XIII, 502 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Architecture of Computing Systems – ARCS 2012
by Herkersdorf, Andreas.
Publication:
. XIII, 252 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Building a National Distributed e-Infrastructure–PL-Grid
by Bubak, Marian.
Publication:
. XII, 354 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Wireless Sensor Networks
by Picco, Gian Pietro.
Publication:
. XII, 261p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Computing and Internet Technology
by Ramanujam, R.
Publication:
. XI, 277p. 111 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Bioinformatics for Personalized Medicine
by Freitas, Ana T.
Publication:
. XII, 121p. 40 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Software Engineering Techniques
by Szmuc, Tomasz.
Publication:
. Approx. 275 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Current Trends in Web Engineering
by Harth, Andreas.
Publication:
. XXXII, 361p. 119 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Grid and Pervasive Computing Workshops
by Rautiainen, Mika.
Publication:
. Approx. 195 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Foundations and Practice of Security
by Garcia-Alfaro, Joaquin.
Publication:
. XIII, 253 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Applications
by Jung, Souhwan.
Publication:
. XII, 271p. 74 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Agents and Data Mining Interaction
by Cao, Longbing.
Publication:
. XIII, 361 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Open Problems in Network Security
by Camenisch, Jan.
Publication:
. VIII, 161p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Danezis, George.
Publication:
. Approx. 335 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Resource Discovery
by Lacroix, Zoé.
Publication:
. VIII, 191 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Smart Card Research and Advanced Applications
by Prouff, Emmanuel.
Publication:
. XI, 337 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advanced Agent Technology
by Dechesne, Francien.
Publication:
. XX, 506 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|