|
|
Focused Retrieval and Evaluation
by Geva, Shlomo.
Publication:
. 110 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Theoretic Security
by Kurosawa, Kaoru.
Publication:
. X, 249p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information, Security and Cryptology – ICISC 2009
by Lee, Donghoon.
Publication:
. XIII, 387p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Controlled Natural Language
by Fuchs, Norbert E.
Publication:
. X, 291p. 62 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Resource Discovery
by Lacroix, Zoé.
Publication:
. IX, 141p. 40 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Data Mining. Applications and Theoretical Aspects
by Perner, Petra.
Publication:
. XIII, 654p. 233 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Information Infrastructures Security
by Rome, Erich.
Publication:
. XII, 213p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithmic Aspects in Information and Management
by Chen, Bo.
Publication:
. XI, 336p. 51 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Testing Techniques in Software Engineering
by Borba, Paulo.
Publication:
. IX, 313p. 73 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Case-Based Reasoning. Research and Development
by Bichindaritz, Isabelle.
Publication:
. 557p. 180 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Web-Age Information Management
by Chen, Lei.
Publication:
. XIX, 785p. 320 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Kreibich, Christian.
Publication:
. XII, 219p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Conceptual Structures: From Information to Intelligence
by Croitoru, Madalina.
Publication:
. XII, 207p. 51 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Requirements Engineering: Foundation for Software Quality
by Wieringa, Roel.
Publication:
. XII, 280p. 62 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Privacy
by Steinfeld, Ron.
Publication:
. XII, 403p. 40 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Intelligence for Knowledge-Based Systems Design
by Hüllermeier, Eyke.
Publication:
. XVII, 771p. 183 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Networked Services and Applications - Engineering, Control and Management
by Aagesen, Finn Arve.
Publication:
. XIII, 275p. 125 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Web Engineering
by Benatallah, Boualem.
Publication:
. 528p. 231 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust and Trustworthy Computing
by Acquisti, Alessandro.
Publication:
. XIII, 441p. 84 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Fast Software Encryption
by Hong, Seokhie.
Publication:
. XI, 385p. 71 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|