//]]>
CONCUR 2011 – Concurrency Theory by Katoen, Joost-Pieter. Publication: . XIV, 560p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Database and Expert Systems Applications by Hameurlain, Abdelkader. Publication: . XXVI, 608 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Database and Expert Systems Applications by Hameurlain, Abdelkader. Publication: . XXV, 562p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Foundations of Security Analysis and Design VI by Aldini, Alessandro. Publication: . VII, 275p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
NETWORKING 2011 Workshops by Casares-Giner, Vicente. Publication: . XVI, 290p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Reasoning Web. Semantic Technologies for the Web of Data by Polleres, Axel. Publication: . IX, 535 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Electronic Government and the Information Systems Perspective by Andersen, Kim Normann. Publication: . XIV, 410p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust, Privacy and Security in Digital Business by Furnell, Steven. Publication: . XII, 223 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Electronic Government by Janssen, Marijn. Publication: . XVI, 466 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Smart Spaces and Next Generation Wired/Wireless Networking by Balandin, Sergey. Publication: . XVI, 634 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – CRYPTO 2011 by Rogaway, Phillip. Publication: . XV, 782p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Towards a Service-Based Internet. ServiceWave 2010 Workshops by Cezon, Michel. Publication: . XXIX, 209 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
ECOOP 2011 – Object-Oriented Programming by Mezini, Mira. Publication: . XIV, 660p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Infrastructures, Services and Applications by Camenisch, Jan. Publication: . XII, 209 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Computational Science XIII by Gavrilova, Marina L. Publication: . XX, 205 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Modeling Decision for Artificial Intelligence by Torra, Vicenç. Publication: . XIII, 259 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Rule-Based Reasoning, Programming, and Applications by Bassiliades, Nick. Publication: . XIII, 385 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Parampalli, Udaya. Publication: . XIII, 464 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ad-hoc, Mobile, and Wireless Networks by Frey, Hannes. Publication: . XI, 361p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Trust Management by Cuellar, Jorge. Publication: . X, 271 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart