|
|
Social Computing, Behavioral - Cultural Modeling and Prediction
by Yang, Shanchieh Jay.
Publication:
. XIV, 366p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Infrastructure Protection
by Lopez, Javier.
Publication:
. XIV, 357 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
NASA Formal Methods
by Goodloe, Alwyn E.
Publication:
. XII, 466p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Privacy Management and Autonomous Spontaneus Security
by Garcia-Alfaro, Joaquin.
Publication:
. XV, 319 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Requirements Engineering: Foundation for Software Quality
by Regnell, Björn.
Publication:
. XV, 322p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Data Hiding and Multimedia Security VII
by Shi, Yun Q.
Publication:
. IX, 115p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Principles of Security and Trust
by Degano, Pierpaolo.
Publication:
. XIV, 431 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Passive and Active Measurement
by Taft, Nina.
Publication:
. XI, 264 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in User Modeling
by Ardissono, Liliana.
Publication:
. X, 416 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Architecture of Computing Systems – ARCS 2012
by Herkersdorf, Andreas.
Publication:
. XIII, 252 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Open Problems in Network Security
by Camenisch, Jan.
Publication:
. VIII, 161p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Danezis, George.
Publication:
. Approx. 335 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory of Security and Applications
by Mödersheim, Sebastian.
Publication:
. IX, 225 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advanced Agent Technology
by Dechesne, Francien.
Publication:
. XX, 506 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security Protocols XIX
by Christianson, Bruce.
Publication:
. IX, 383 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Middleware 2011
by Kon, Fabio.
Publication:
. XIII, 514 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Web-Based Learning - ICWL 2011
by Leung, Howard.
Publication:
. XIV, 334p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Social Robotics
by Mutlu, Bilge.
Publication:
. XV, 237p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Interactive Storytelling
by Si, Mei.
Publication:
. XIV, 384p. 76 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trusted Systems
by Chen, Liqun.
Publication:
. XIV, 362p. 73 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|