|
|
Cloud Computing
by Yousif, Mazin.
Publication:
. X, 145 p. 53 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure IP Mobility Management for VANET
by Taha, Sanaa.
Publication:
. IX, 106 p. 46 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Measuring SIP Proxy Server Performance
by Subramanian, Sureshkumar V.
Publication:
. XXIV, 191 p. 115 illus., 106 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Seductive Computer
by Partridge, Derek.
Publication:
. XVI, 323p. 56 illus., 6 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Making Systems Safer
by Dale, Chris.
Publication:
. X, 273p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Assessment in Vehicular Networks
by Du, Suguo.
Publication:
. XI, 49 p. 9 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Location Privacy Protection in Mobile Networks
by Liu, Xinxin.
Publication:
. XII, 75 p. 23 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks
by Tang, Jin.
Publication:
. X, 86 p. 31 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Privacy in Mobile Social Networks
by Liang, Xiaohui.
Publication:
. VIII, 100 p. 27 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security for Wireless Implantable Medical Devices
by Hei, Xiali.
Publication:
. XI, 45 p. 13 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Physical Layer Approaches for Securing Wireless Communication Systems
by Wen, Hong.
Publication:
. X, 83 p. 53 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Structured Peer-to-Peer Systems
by Korzun, Dmitry.
Publication:
. XXII, 366 p. 84 illus., 45 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Moving Target Defense II
by Jajodia, Sushil.
Publication:
. XII, 203 p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Handbook of Data Intensive Computing
by Furht, Borko.
Publication:
. XVIII, 794 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Concise Guide to Databases
by Lake, Peter.
Publication:
. XIX, 307 p. 113 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Embedded Multimedia Security Systems
by Pande, Amit.
Publication:
. XVII, 146 p. 57 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Achieving Systems Safety
by Dale, Chris.
Publication:
. X, 293p. 81 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Managed Grids and Cloud Systems in the Asia-Pacific Research Community
by Lin, Simon C.
Publication:
. XIV, 359p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Open Source Software for Digital Forensics
by Huebner, Ewa.
Publication:
. VII, 117p. 40 illus., 20 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Systems Safety
by Dale, Chris.
Publication:
. X, 315p. 62 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|