//]]>
Computer Safety, Reliability, and Security by Bitsch, Friedemann. Publication: . XVI, 304 p. 109 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented and Cloud Computing by Lau, Kung-Kiu. Publication: . X, 244 p. 80 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Aided Verification by Sharygina, Natasha. Publication: . XXII, 1015 p. 237 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Science and Its Applications – ICCSA 2013 by Murgante, Beniamino. Publication: . XXXVI, 679 p. 276 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Science and Its Applications – ICCSA 2013 by Murgante, Beniamino. Publication: . XXXVI, 729 p. 317 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Interactive Theorem Proving by Blazy, Sandrine. Publication: . XII, 498 p. 73 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Detection of Intrusions and Malware, and Vulnerability Assessment by Rieck, Konrad. Publication: . XII, 207 p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
E-Voting and Identify by Heather, James. Publication: . X, 211 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Emerging Management Mechanisms for the Future Internet by Doyen, Guillaume. Publication: . XVI, 161 p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems by Cavallaro, Lorenzo. Publication: . XVI, 145 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Infocomm Technology by Guyot, Vincent. Publication: . XVI, 358 p. 153 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented Computing - ICSOC 2012 Workshops by Ghose, Aditya. Publication: . XVI, 466 p. 153 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Smart Card Research and Advanced Applications by Mangard, Stefan. Publication: . XII, 297 p. 98 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Foundations and Practice of Security by Garcia-Alfaro, Joaquin. Publication: . XIV, 383 p. 90 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fundamental Approaches to Software Engineering by Cortellessa, Vittorio. Publication: . XX, 376 p. 90 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Pervasive Computing and the Networked World by Zu, Qiaohong. Publication: . XXII, 921 p. 434 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Engineering Secure Software and Systems by Jürjens, Jan. Publication: . XII, 231 p. 40 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Radio Frequency Identification. Security and Privacy Issues by Hoepman, Jaap-Henk. Publication: . X, 181 p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Methods for Components and Objects by Beckert, Bernhard. Publication: . X, 356 p. 129 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Aspects of Component Software by Arbab, Farhad. Publication: . X, 369 p. 131 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Refine your search