//]]>
Progress in Cryptology – INDOCRYPT 2013 by Paul, Goutam. Publication: . XVIII, 319 p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trusted Systems by Bloem, Roderick. Publication: . XII, 103 p. 18 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Social Informatics by Jatowt, Adam. Publication: . XVI, 494 p. 168 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fuzzy Logic and Applications by Masulli, Francesco. Publication: . XII, 249 p. 67 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ubiquitous Computing and Ambient Intelligence. Context-Awareness and Context-Driven Interaction by Urzaiz, Gabriel. Publication: . XVI, 401 p. 166 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Computer Entertainment by Reidsma, Dennis. Publication: . XXVI, 668 p. 284 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ambient Assisted Living and Active Aging by Nugent, Christopher. Publication: . XIV, 137 p. 44 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Stabilization, Safety, and Security of Distributed Systems by Higashino, Teruo. Publication: . XXIV, 380 p. 86 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Hardware and Software: Verification and Testing by Bertacco, Valeria. Publication: . XX, 366 p. 147 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Human Computer Interaction by Collazos, César. Publication: . XII, 157 p. 49 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Biometric Recognition by Sun, Zhenan. Publication: . XVI, 469 p. 262 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Visual Informatics by Zaman, Halimah Badioze. Publication: . XX, 799 p. 371 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptology and Network Security by Abdalla, Michel. Publication: . XVIII, 349 p. 52 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Concepts for Intelligent Vision Systems by Blanc-Talon, Jacques. Publication: . XVI, 717 p. 333 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Decision and Game Theory for Security by Das, Sajal K. Publication: . X, 265 p. 57 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Interactive Storytelling by Koenitz, Hartmut. Publication: . XII, 288 p. 78 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Brain and Health Informatics by Imamura, Kazayuki. Publication: . XVIII, 539 p. 222 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Active Media Technology by Yoshida, Tetsuya. Publication: . XVIII, 434 p. 217 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information and Communications Security by Qing, Sihan. Publication: . XIV, 414 p. 94 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Human Behavior Understanding by Salah, Albert Ali. Publication: . XII, 259 p. 74 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart