|
|
Understanding Concurrent Systems
by Roscoe, A.W.
Publication:
. XVIII, 530 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Requirements Engineering and Management for Software Development Projects
by Chemuturi, Murali.
Publication:
. XXI, 266 p. 20 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
On the Performance of Web Services
by Tari, Zahir.
Publication:
. XII, 244p. 101 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Quantitative Security Risk Assessment of Enterprise Networks
by Ou, Xinming.
Publication:
. XIII, 28p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Energy-Efficient High Performance Computing
by Laros III, James H.
Publication:
. XIV, 67 p. 19 illus., 8 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy and Security for Cloud Computing
by Pearson, Siani.
Publication:
. XVI, 306 p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Guide to Reliable Distributed Systems
by Birman, Kenneth P.
Publication:
. XXII, 730 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Composing Software Components
by Hamlet, Dick.
Publication:
. XVII, 368p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Adaptive Cryptographic Access Control
by Kayem, Anne V. D. M.
Publication:
. XIV, 138 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Association Rule Hiding for Data Mining
by Gkoulalas-Divanis, Aris.
Publication:
. XX, 138p. 120 illus., 60 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
iOS Forensic Analysis for iPhone, iPad, and iPod touch
by Morrissey, Sean.
Publication:
. XIV, 372 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Beginning Microsoft Excel 2010
by Katz, Abbbott.
Publication:
. 408 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|