//]]>
Cloud Computing by Yousif, Mazin. Publication: . X, 145 p. 53 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Secure IP Mobility Management for VANET by Taha, Sanaa. Publication: . IX, 106 p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Measuring SIP Proxy Server Performance by Subramanian, Sureshkumar V. Publication: . XXIV, 191 p. 115 illus., 106 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Seductive Computer by Partridge, Derek. Publication: . XVI, 323p. 56 illus., 6 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Making Systems Safer by Dale, Chris. Publication: . X, 273p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Assessment in Vehicular Networks by Du, Suguo. Publication: . XI, 49 p. 9 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Location Privacy Protection in Mobile Networks by Liu, Xinxin. Publication: . XII, 75 p. 23 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks by Tang, Jin. Publication: . X, 86 p. 31 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Privacy in Mobile Social Networks by Liang, Xiaohui. Publication: . VIII, 100 p. 27 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security for Wireless Implantable Medical Devices by Hei, Xiali. Publication: . XI, 45 p. 13 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Physical Layer Approaches for Securing Wireless Communication Systems by Wen, Hong. Publication: . X, 83 p. 53 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Structured Peer-to-Peer Systems by Korzun, Dmitry. Publication: . XXII, 366 p. 84 illus., 45 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Moving Target Defense II by Jajodia, Sushil. Publication: . XII, 203 p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Handbook of Data Intensive Computing by Furht, Borko. Publication: . XVIII, 794 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Concise Guide to Databases by Lake, Peter. Publication: . XIX, 307 p. 113 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Embedded Multimedia Security Systems by Pande, Amit. Publication: . XVII, 146 p. 57 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Achieving Systems Safety by Dale, Chris. Publication: . X, 293p. 81 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Managed Grids and Cloud Systems in the Asia-Pacific Research Community by Lin, Simon C. Publication: . XIV, 359p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Open Source Software for Digital Forensics by Huebner, Ewa. Publication: . VII, 117p. 40 illus., 20 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Systems Safety by Dale, Chris. Publication: . X, 315p. 62 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart