|
|
Software Composition
by Gschwind, Thomas.
Publication:
. XII, 195p. 66 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Objects, Models, Components, Patterns
by Furia, Carlo A.
Publication:
. XI, 372p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithms and Models for the Web Graph
by Bonato, Anthony.
Publication:
. VIII, 179 p. 30 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory and Practice of Model Transformations
by Hu, Zhenjiang.
Publication:
. X, 297p. 115 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligence and Security Informatics
by Chau, Michael.
Publication:
. X, 207p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Telecommunication Economics
by Hadjiantonis, Antonis M.
Publication:
. IX, 243 p. 61 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Fun with Algorithms
by Kranakis, Evangelos.
Publication:
. XI, 397p. 148 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Semantic Web: Research and Applications
by Simperl, Elena.
Publication:
. XXI, 877 p. 233 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Future Internet
by Álvarez, Federico.
Publication:
. XXV, 252 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Knowledge Discovery and Data Mining
by Tan, Pang-Ning.
Publication:
. XXIV, 445 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Knowledge Discovery and Data Mining
by Tan, Pang-Ning.
Publication:
. XXIII, 619 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trustworthy Global Computing
by Bruni, Roberto.
Publication:
. X, 243p. 54 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Cryptography – PKC 2012
by Fischlin, Marc.
Publication:
. XIV, 734 p. 63 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
NETWORKING 2012
by Bestak, Robert.
Publication:
. XXI, 421 p. 182 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
NETWORKING 2012
by Bestak, Robert.
Publication:
. XXII, 437 p. 191 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
NETWORKING 2012 Workshops
by Becvar, Zdenek.
Publication:
. XVI, 158p. 57 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Trust Management
by Meadows, Catherine.
Publication:
. X, 239p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Semantic Web
by Pan, Jeff Z.
Publication:
. XIII, 436p. 119 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Constructive Side-Channel Analysis and Secure Design
by Schindler, Werner.
Publication:
. Approx. 280 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Danezis, George.
Publication:
. XII, 185 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|