|
|
Computational Social Network Analysis
by Abraham, Ajith.
Publication:
. XII, 485p. 203 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transportation and Information
by Thakuriah, Piyushimita (Vonu).
Publication:
. X, 127 p. 3 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Requirements Engineering and Management for Software Development Projects
by Chemuturi, Murali.
Publication:
. XXI, 266 p. 20 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
On the Performance of Web Services
by Tari, Zahir.
Publication:
. XII, 244p. 101 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Quantitative Security Risk Assessment of Enterprise Networks
by Ou, Xinming.
Publication:
. XIII, 28p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Security Breaches and Privacy in Europe
by Wong, Rebecca.
Publication:
. VII, 54 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Countering Brandjacking in the Digital Age
by Hofman, Christopher.
Publication:
. VIII, 87 p. 18 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Understanding Learning in Virtual Worlds
by Childs, Mark.
Publication:
. XXII, 179 p. 39 illus., 36 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
ECSCW 2013: Proceedings of the 13th European Conference on Computer Supported Cooperative Work, 21-25 September 2013, Paphos, Cyprus
by Bertelsen, Olav W.
Publication:
. XIV, 300 p. 30 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Privacy in Biometrics
by Campisi, Patrizio.
Publication:
. X, 438 p. 114 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Explaining Algorithms Using Metaphors
by Forišek, Michal.
Publication:
. X, 94 p. 59 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Disclosure of Security Vulnerabilities
by Maurushat, Alana.
Publication:
. X, 121 p. 4 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ethical and Social Issues in the Information Age
by Kizza, Joseph Migga.
Publication:
. XVIII, 372 p. 22 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Eye Gaze in Intelligent User Interfaces
by Nakano, Yukiko I.
Publication:
. X, 207 p. 84 illus., 71 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Secure Information Society
by Krüger, Jörg.
Publication:
. X, 213 p. 41 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Energy-Efficient High Performance Computing
by Laros III, James H.
Publication:
. XIV, 67 p. 19 illus., 8 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Connecting Families
by Neustaedter, Carman.
Publication:
. VIII, 197 p. 41 illus., 34 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy and Security for Cloud Computing
by Pearson, Siani.
Publication:
. XVI, 306 p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
A Journey Through Cultures
by Salgado, Luciana Cardoso de Castro.
Publication:
. XIII, 128 p. 48 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Anonymization
by Weber, Rolf H.
Publication:
. VII, 73p.
Availability:
Copies available:
AUM Main Library
(1),
|
|