|
|
Electronic Government
by Janssen, Marijn.
Publication:
. XVI, 466 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – CRYPTO 2011
by Rogaway, Phillip.
Publication:
. XV, 782p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Hybrid Learning
by Kwan, Reggie.
Publication:
. XVI, 367 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Edutainment VI
by Pan, Zhigeng.
Publication:
. XI, 266 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Infrastructures, Services and Applications
by Camenisch, Jan.
Publication:
. XII, 209 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Computational Science XIII
by Gavrilova, Marina L.
Publication:
. XX, 205 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Privacy
by Parampalli, Udaya.
Publication:
. XIII, 464 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Trust Management
by Cuellar, Jorge.
Publication:
. X, 271 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Collaborative Agents - Research and Development
by Guttmann, Christian.
Publication:
. VIII, 187p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Holz, Thorsten.
Publication:
. X, 235p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Computational Science XII
by Gavrilova, Marina L.
Publication:
. XIV, 279 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Natural Language Processing and Information Systems
by Muñoz, Rafael.
Publication:
. XV, 350 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy Enhancing Technologies
by Fischer-Hübner, Simone.
Publication:
. X, 285 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Protocols XVI
by Christianson, Bruce.
Publication:
. IX, 257 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligence and Security Informatics
by Chau, Michael.
Publication:
. X, 133p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Agent and Multi-Agent Systems: Technologies and Applications
by O’Shea, James.
Publication:
. XVII, 704p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology – AFRICACRYPT 2011
by Nitaj, Abderrahmane.
Publication:
. XIII, 387p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Artificial Intelligence in Education
by Biswas, Gautam.
Publication:
. XXVI, 638p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Product-Focused Software Process Improvement
by Caivano, Danilo.
Publication:
. XIII, 353p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Online Communities and Social Computing
by Ozok, A. Ant.
Publication:
. XX, 388p.
Availability:
Copies available:
AUM Main Library
(1),
|
|