|
|
Quantitative Security Risk Assessment of Enterprise Networks
by Ou, Xinming.
Publication:
. XIII, 28p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mobile Intention Recognition
by Kiefer, Peter.
Publication:
. XVI, 168 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Effects of Traffic Structure on Application and Network Performance
by Aikat, Jay.
Publication:
. VIII, 298 p. 394 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Linking Government Data
by Wood, David.
Publication:
. XX, 232 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Semantic Web Services for Web Databases
by Ouzzani, Mourad.
Publication:
. XXI, 134p. 33 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service Level Agreements for Cloud Computing
by Wieder, Philipp.
Publication:
. XXVI, 358 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intermittently Connected Mobile Ad Hoc Networks
by Jamalipour, Abbas.
Publication:
. XVIII, 110p. 30 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Bootstrapping Trust in Modern Computers
by Parno, Bryan.
Publication:
. IX, 101p. 10 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Science
by Blum, Edward K.
Publication:
. X, 470 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Communicating with XML
by Salminen, Airi.
Publication:
. XIV, 226 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Moving Target Defense
by Jajodia, Sushil.
Publication:
. XVI, 184 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Hard Real-Time Computing Systems
by Buttazzo, Giorgio C.
Publication:
. XVI, 524 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Scalable Network Monitoring in High Speed Networks
by Choi, Baek-Young.
Publication:
. XV, 148p. 76 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
CAN System Engineering
by Lawrenz, Wolfhard.
Publication:
. XXV, 353 p. 186 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Middleware Solutions for the Internet of Things
by Delicato, Flávia C.
Publication:
. X, 78 p. 39 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advanced Network Programming – Principles and Techniques
by Ciubotaru, Bogdan.
Publication:
. XVI, 250 p. 72 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
An Introduction to Network Programming with Java
by Graba, Jan.
Publication:
. XII, 380 p. 84 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Botnets
by Tiirmaa-Klaar, Heli.
Publication:
. VIII, 97 p. 5 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Graph Algorithms for Computer Networks
by Erciyes, K.
Publication:
. XVIII, 324 p. 167 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Next-Generation Wireless Technologies
by Chilamkurti, Naveen.
Publication:
. X, 285 p. 92 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|