|
|
Security Protocols XIX
by Christianson, Bruce.
Publication:
. IX, 383 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Middleware 2011
by Kon, Fabio.
Publication:
. XIII, 514 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Multi-disciplinary Trends in Artificial Intelligence
by Sombattheera, Chattrakul.
Publication:
. 444p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology – INDOCRYPT 2011
by Bernstein, Daniel J.
Publication:
. XIII, 401 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Performance Evaluation of Computer and Communication Systems. Milestones and Future Challenges
by Hummel, Karin Anna.
Publication:
. XII, 255 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Systems Security
by Jajodia, Sushil.
Publication:
. XV, 388 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service-Oriented Computing
by Kappel, Gerti.
Publication:
. XVIII, 680 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Internet and Network Economics
by Chen, Ning.
Publication:
. XII, 420 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligent Robotics and Applications
by Jeschke, Sabina.
Publication:
. XXIV, 623 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligent Robotics and Applications
by Jeschke, Sabina.
Publication:
. XXIV, 643 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Post-Quantum Cryptography
by Yang, Bo-Yin.
Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg, 2011
Date:2011
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Image and Video Technology
by Ho, Yo-Sung.
Publication:
. XVII, 423 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Quality in e-Health
by Holzinger, Andreas.
Publication:
. XVI, 716p. 219 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Image and Video Technology
by Ho, Yo-Sung.
Publication:
. XVII, 407 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
RFID. Security and Privacy
by Juels, Ari.
Publication:
. X, 260p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trusted Systems
by Chen, Liqun.
Publication:
. XIV, 362p. 73 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Decision and Game Theory for Security
by Baras, John S.
Publication:
. X, 259 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
SDL 2011: Integrating System and Software Modeling
by Ober, Iulian.
Publication:
. VIII, 277p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Computing and Applications
by Liu, Baoxiang.
Publication:
. XVIII, 775 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ambient Intelligence
by Keyson, David V.
Publication:
. XVI, 383 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|