|
|
Human Factors in Computing and Informatics
by Holzinger, Andreas.
Publication:
. XXIV, 845 p. 294 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
ECOOP 2013 – Object-Oriented Programming
by Castagna, Giuseppe.
Publication:
. XXII, 746 p. 206 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Software Architecture
by Drira, Khalil.
Publication:
. XVI, 354 p. 133 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Modelling Foundations and Applications
by Gorp, Pieter.
Publication:
. X, 237 p. 93 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Emerging Management Mechanisms for the Future Internet
by Doyen, Guillaume.
Publication:
. XVI, 161 p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Cryptography and Network Security
by Jacobson, Michael.
Publication:
. XIV, 572 p. 115 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
SDL 2013: Model-Driven Dependability Engineering
by Khendek, Ferhat.
Publication:
. XII, 291 p. 138 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust and Trustworthy Computing
by Huth, Michael.
Publication:
. XIV, 278 p. 85 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computing and Combinatorics
by Du, Ding-Zhu.
Publication:
. XVIII, 861 p. 220 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Benchmarking Peer-to-Peer Systems
by Effelsberg, Wolfgang.
Publication:
. VIII, 197 p. 57 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network and System Security
by Lopez, Javier.
Publication:
. XX, 793 p. 207 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Web-Age Information Management
by Wang, Jianyong.
Publication:
. XXVIII, 812 p. 326 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Applications and Interoperable Systems
by Dowling, Jim.
Publication:
. XII, 205 p. 75 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems
by Cavallaro, Lorenzo.
Publication:
. XVI, 145 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Coordination Models and Languages
by Nicola, Rocco.
Publication:
. XIV, 251 p. 76 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Wired/Wireless Internet Communication
by Tsaoussidis, Vassilis.
Publication:
. XII, 277 p. 145 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithms and Complexity
by Spirakis, Paul G.
Publication:
. XIV, 384 p. 75 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advanced Infocomm Technology
by Guyot, Vincent.
Publication:
. XVI, 358 p. 153 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Model-Based Methodologies for Pervasive and Embedded Software
by Machado, Ricardo J.
Publication:
. X, 139 p. 61 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Future Internet
by Galis, Alex.
Publication:
. XLIV, 369 p. 131 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|