//]]>
Advances in Knowledge Discovery and Data Mining by Tan, Pang-Ning. Publication: . XXIII, 619 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthy Global Computing by Bruni, Roberto. Publication: . X, 243p. 54 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Cryptography – PKC 2012 by Fischlin, Marc. Publication: . XIV, 734 p. 63 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
NETWORKING 2012 by Bestak, Robert. Publication: . XXI, 421 p. 182 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
NETWORKING 2012 by Bestak, Robert. Publication: . XXII, 437 p. 191 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
NETWORKING 2012 Workshops by Becvar, Zdenek. Publication: . XVI, 158p. 57 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Trust Management by Meadows, Catherine. Publication: . X, 239p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Semantic Web by Pan, Jeff Z. Publication: . XIII, 436p. 119 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Constructive Side-Channel Analysis and Secure Design by Schindler, Werner. Publication: . Approx. 280 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Danezis, George. Publication: . XII, 185 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Design Science Research in Information Systems. Advances in Theory and Practice by Peffers, Ken. Publication: . XI, 439p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Infrastructures, Services and Applications by Petkova-Nikova, Svetla. Publication: . X, 209 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Communication Technologies for Vehicles by Vinel, Alexey. Publication: . XII, 188 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web Technologies and Applications by Wang, Hua. Publication: . XXIII, 270p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Aspects of Security and Trust by Barthe, Gilles. Publication: . X, 279 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Logic Programs, Norms and Action by Artikis, Alexander. Publication: . XX, 425 p. 36 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Health Information Science by He, Jing. Publication: . XIII, 187p. 71 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Computational Collective Intelligence VI by Nguyen, Ngoc Thanh. Publication: . XII, 224 p. 67 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
LATIN 2012: Theoretical Informatics by Fernández-Baca, David. Publication: . XVII, 669 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Games, Actions and Social Software by Eijck, Jan. Publication: . XIV, 214 p. 15 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart