|
|
Web-Age Information Management
by Gao, Yunjun.
Publication:
. XXXIV, 396 p. 165 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Big Data
by Gottlob, Georg.
Publication:
. XII, 303 p. 89 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Integration in the Life Sciences
by Baker, Christopher J. O.
Publication:
. X, 141 p. 40 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Human-Computer Interaction. Users and Contexts of Use
by Kurosu, Masaaki.
Publication:
. XXII, 514 p. 171 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Product-Focused Software Process Improvement
by Heidrich, Jens.
Publication:
. XVI, 374 p. 87 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data and Applications Security and Privacy XXVII
by Wang, Lingyu.
Publication:
. XIV, 305 p. 71 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ad-hoc, Mobile, and Wireless Network
by Cichoń, Jacek.
Publication:
. XIV, 329 p. 150 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Rieck, Konrad.
Publication:
. XII, 207 p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Human-Computer Interaction and Knowledge Discovery in Complex, Unstructured, Big Data
by Holzinger, Andreas.
Publication:
. XVI, 442 p. 136 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Similarity-Based Pattern Recognition
by Hancock, Edwin.
Publication:
. X, 297 p. 90 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Foundations of Health Information Engineering and Systems
by Weber, Jens.
Publication:
. X, 223 p. 85 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy Enhancing Technologies
by Cristofaro, Emiliano.
Publication:
. X, 265 p. 88 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Privacy
by Boyd, Colin.
Publication:
. XII, 437 p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Software Architecture
by Drira, Khalil.
Publication:
. XVI, 354 p. 133 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Modelling Foundations and Applications
by Gorp, Pieter.
Publication:
. X, 237 p. 93 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Emerging Management Mechanisms for the Future Internet
by Doyen, Guillaume.
Publication:
. XVI, 161 p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Cryptography and Network Security
by Jacobson, Michael.
Publication:
. XIV, 572 p. 115 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
SDL 2013: Model-Driven Dependability Engineering
by Khendek, Ferhat.
Publication:
. XII, 291 p. 138 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust and Trustworthy Computing
by Huth, Michael.
Publication:
. XIV, 278 p. 85 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory and Practice of Model Transformations
by Duddy, Keith.
Publication:
. XIV, 221 p. 85 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|