//]]>
Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks by Tang, Jin. Publication: . X, 86 p. 31 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Resource Management in Utility and Cloud Computing by Zhao, Han. Publication: . XII, 82 p. 22 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy in Mobile Social Networks by Liang, Xiaohui. Publication: . VIII, 100 p. 27 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Studies on Urban Vehicular Ad-hoc Networks by Zhu, Hongzi. Publication: . IX, 124 p. 78 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Android Malware by Jiang, Xuxian. Publication: . XI, 44 p. 9 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Modeling Trust Context in Networks by Adali, Sibel. Publication: . VI, 83 p. 13 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web-Scale Data Management for the Cloud by Lehner, Wolfgang. Publication: . XV, 193 p. 74 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Medium Access Control in Wireless Networks by Wang, Ping. Publication: . XII, 109 p. 42 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Physical Layer Approaches for Securing Wireless Communication Systems by Wen, Hong. Publication: . X, 83 p. 53 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Routing for Wireless Multi-Hop Networks by Abdel Hamid, Sherin. Publication: . XV, 73 p. 14 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Managing and Mining Sensor Data by Aggarwal, Charu C. Publication: . XIV, 534 p. 66 illus., 43 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
3D Surface Reconstruction by Bellocchio, Francesco. Publication: . VI, 162 p. 78 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Structured Peer-to-Peer Systems by Korzun, Dmitry. Publication: . XXII, 366 p. 84 illus., 45 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Moving Target Defense II by Jajodia, Sushil. Publication: . XII, 203 p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Dynamic Cloud Collaboration Platform by Hassan, Mohammad Mehedi. Publication: . X, 90 p. 19 illus., 8 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Programming by Shankar, A. Udaya. Publication: . XVIII, 387 p. 175 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mobile Authentication by Jakobsson, Markus. Publication: . XIV, 113 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network Robustness under Large-Scale Attacks by Zhou, Qing. Publication: . VIII, 41 p. 12 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Traffic Measurement on the Internet by Li, Tao. Publication: . IX, 82 p. 24 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Agent-Based Semantic Web Service Composition by Kumar, Sandeep. Publication: . X, 57 p. 7 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية