|
|
Privacy Enhancing Technologies
by Atallah, Mikhail J.
Publication:
. X, 291p. 51 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Theoretic Security
by Kurosawa, Kaoru.
Publication:
. X, 249p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Data Hiding and Multimedia Security V
by Shi, Yun Q.
Publication:
. XI, 129p. 66 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Kreibich, Christian.
Publication:
. XII, 219p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Requirements Engineering: Foundation for Software Quality
by Wieringa, Roel.
Publication:
. XII, 280p. 62 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computers Helping People with Special Needs
by Miesenberger, Klaus.
Publication:
. 644p. 306 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computers Helping People with Special Needs
by Miesenberger, Klaus.
Publication:
. 727p. 177 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Haptics: Generating and Perceiving Tangible Sensations
by Kappers, Astrid M. L.
Publication:
. XX, 460p. 227 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Haptics: Generating and Perceiving Tangible Sensations
by Kappers, Astrid M. L.
Publication:
. 440p. 246 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Networked Services and Applications - Engineering, Control and Management
by Aagesen, Finn Arve.
Publication:
. XIII, 275p. 125 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Natural Language Processing and Information Systems
by Hopfe, Christina J.
Publication:
. 327p. 74 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust and Trustworthy Computing
by Acquisti, Alessandro.
Publication:
. XIII, 441p. 84 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Product-Focused Software Process Improvement
by Ali Babar, M.
Publication:
. XIII, 410p. 115 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Architecting Critical Systems
by Giese, Holger.
Publication:
. 205p. 82 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Agent and Multi-Agent Systems: Technologies and Applications
by Jędrzejowicz, Piotr.
Publication:
. XVIII, 443p. 147 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Agent and Multi-Agent Systems: Technologies and Applications
by Jędrzejowicz, Piotr.
Publication:
. 450p. 142 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Communications and Multimedia Security
by Decker, Bart.
Publication:
. XIII, 281p. 74 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Towards Trustworthy Elections
by Chaum, David.
Publication:
. VIII, 403p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security, Practice and Experience
by Kwak, Jin.
Publication:
. XIII, 399p. 68 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ethics and Policy of Biometrics
by Kumar, Ajay.
Publication:
. VIII, 169p.
Availability:
Copies available:
AUM Main Library
(1),
|
|