|
|
Bluetooth Security Attacks
by Haataja, Keijo.
Publication:
. VII, 93 p. 31 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Understanding High-Dimensional Spaces
by Skillicorn, David B.
Publication:
. IX, 108 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Software Testing in the Cloud
by Tilley, Scott.
Publication:
. XV, 103 p. 40 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
On the Mathematics of Modelling, Metamodelling, Ontologies and Modelling Languages
by Henderson-Sellers, Brian.
Publication:
. IX, 106 p. 98 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Event-Driven Surveillance
by Denecke, Kerstin.
Publication:
. X, 76 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Unsupervised Information Extraction by Text Segmentation
by Cortez, Eli.
Publication:
. XV, 94 p. 25 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Sustainable Wireless Networks
by Zheng, Zhongming.
Publication:
. IX, 59 p. 24 illus., 3 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Spatio-Temporal Databases
by Vieira, Marcos R.
Publication:
. XIII, 114 p. 46 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cyber Security
by Martellini, Maurizio.
Publication:
. XIV, 72 p. 10 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Center Networks
by Liu, Yang.
Publication:
. XII, 68 p. 16 illus., 15 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Concise Computer Mathematics
by Bagdasar, Ovidiu.
Publication:
. XII, 109 p. 17 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
A Brief History of Cryptology and Cryptographic Algorithms
by Dooley, John F.
Publication:
. XII, 99 p. 33 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure IP Mobility Management for VANET
by Taha, Sanaa.
Publication:
. IX, 106 p. 46 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Wireless Virtualization
by Wen, Heming.
Publication:
. XIV, 112 p. 42 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Assessment in Vehicular Networks
by Du, Suguo.
Publication:
. XI, 49 p. 9 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Location Privacy Protection in Mobile Networks
by Liu, Xinxin.
Publication:
. XII, 75 p. 23 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Hash Table
by Zhang, Hao.
Publication:
. VIII, 67 p. 15 illus., 3 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks
by Tang, Jin.
Publication:
. X, 86 p. 31 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Resource Management in Utility and Cloud Computing
by Zhao, Han.
Publication:
. XII, 82 p. 22 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Privacy in Mobile Social Networks
by Liang, Xiaohui.
Publication:
. VIII, 100 p. 27 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|