|
|
Information, Security and Cryptology – ICISC 2009
by Lee, Donghoon.
Publication:
. XIII, 387p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Resource Discovery
by Lacroix, Zoé.
Publication:
. IX, 141p. 40 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Self-Organizing Architectures
by Weyns, Danny.
Publication:
. X, 301p. 110 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Information Infrastructures Security
by Rome, Erich.
Publication:
. XII, 213p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
New Modeling Concepts for Today’s Software Processes
by Münch, Jürgen.
Publication:
. XIV, 382p. 133 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Data Hiding and Multimedia Security V
by Shi, Yun Q.
Publication:
. XI, 129p. 66 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Aided Verification
by Touili, Tayssir.
Publication:
. XVI, 676p. 169 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Case-Based Reasoning. Research and Development
by Bichindaritz, Isabelle.
Publication:
. 557p. 180 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Web-Age Information Management
by Chen, Lei.
Publication:
. XIX, 785p. 320 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Kreibich, Christian.
Publication:
. XII, 219p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Requirements Engineering: Foundation for Software Quality
by Wieringa, Roel.
Publication:
. XII, 280p. 62 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Automata, Languages and Programming
by Abramsky, Samson.
Publication:
. XXIII, 754p. 42 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Automata, Languages and Programming
by Abramsky, Samson.
Publication:
. XXIV, 614p. 78 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Artifical Evolution
by Collet, Pierre.
Publication:
. XII, 207p. 75 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Euro-Par 2009 – Parallel Processing Workshops
by Lin, Hai-Xiang.
Publication:
. XIX, 468p. 137 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
ECOOP 2010 – Object-Oriented Programming
by D’Hondt, Theo.
Publication:
. XIII, 599p. 196 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Privacy
by Steinfeld, Ron.
Publication:
. XII, 403p. 40 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Software Composition
by Baudry, Benoît.
Publication:
. VIII, 155p. 56 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computing and Combinatorics
by Thai, My T.
Publication:
. 553p. 103 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mechanisms for Autonomous Management of Networks and Services
by Stiller, Burkhard.
Publication:
. XIII, 179p. 66 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|