|
|
Engineering Psychology and Cognitive Ergonomics
by Harris, Don.
Publication:
. XXII, 637 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Analytical and Stochastic Modeling Techniques and Applications
by Al-Begain, Khalid.
Publication:
. XI, 347p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Design, User Experience, and Usability. Theory, Methods, Tools and Practice
by Marcus, Aaron.
Publication:
. XXXI, 676 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Information Infrastructures Security
by Xenakis, Christos.
Publication:
. X, 161p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Design, User Experience, and Usability. Theory, Methods, Tools and Practice
by Marcus, Aaron.
Publication:
. XXXI, 718 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust and Trustworthy Computing
by McCune, Jonathan M.
Publication:
. VII, 314p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology
by Lai, Xuejia.
Publication:
. XIV, 524p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Managing the Dynamics of Networks and Services
by Chrisment, Isabelle.
Publication:
. X, 181p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Applications and Interoperable Systems
by Felber, Pascal.
Publication:
. XII, 304 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Tools for Teaching Logic
by Blackburn, Patrick.
Publication:
. XI, 257p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ambient Assisted Living
by Bravo, José.
Publication:
. XII, 226p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Coordination, Organizations, Institutions, and Norms in Agent Systems VI
by Vos, Marina.
Publication:
. XVI, 377p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication
by Ardagna, Claudio A.
Publication:
. XIII, 392 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Practice and Experience
by Bao, Feng.
Publication:
. XIII, 448p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Future Internet
by Domingue, John.
Publication:
. XVI, 465 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Theoretic Security
by Fehr, Serge.
Publication:
. X, 227 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
New Horizons in Web-Based Learning - ICWL 2010 Workshops
by Luo, Xiangfeng.
Publication:
. XXIV, 338 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
NASA Formal Methods
by Bobaru, Mihaela.
Publication:
. XIV, 534 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy and Security Issues in Data Mining and Machine Learning
by Dimitrakakis, Christos.
Publication:
. VII, 141 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Requirements Engineering: Foundation for Software Quality
by Berry, Daniel.
Publication:
. XII, 209 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|