//]]>
Artificial Intelligence and Computational Intelligence by Wang, Fu Lee. Publication: . XXII, 386p. 149 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web Information Systems and Mining by Wang, Fu Lee. Publication: . XV, 442p. 168 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Infrastructures, Services and Applications by Martinelli, Fabio. Publication: . X, 303p. 41 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Hiding by Böhme, Rainer. Publication: . X, 277p. 98 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Ubiquitous Knowledge Discovery by May, Michael. Publication: . X, 255p. 51 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology by Bao, Feng. Publication: . XIII, 460p. 75 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Provable Security by Heng, Swee-Huay. Publication: . X, 279p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented Computing. ICSOC/ServiceWave 2009 Workshops by Dan, Asit. Publication: . XXXIV, 584p. 177 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Stabilization, Safety, and Security of Distributed Systems by Dolev, Shlomi. Publication: . XVI, 614p. 150 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy in Statistical Databases by Domingo-Ferrer, Josep. Publication: . XI, 297p. 47 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Multimedia Information Processing - PCM 2010 by Qiu, Guoping. Publication: . XXII, 745p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Safety, Reliability, and Security by Schoitsch, Erwin. Publication: . X, 482p. 197 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthly Global Computing by Wirsing, Martin. Publication: . XII, 380p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Secure Data Management by Jonker, Willem. Publication: . X, 172p. 65 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Security – ESORICS 2010 by Gritzalis, Dimitris. Publication: . XIV, 718p. 163 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Knowledge-Based and Intelligent Information and Engineering Systems by Setchi, Rossitza. Publication: . XXIII, 651p. 298 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Database and Expert Systems Applications by Bringas, Pablo García. Publication: . XXVI, 523p. 227 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Cryptography for Networks by Garay, Juan A. Publication: . VII, 474p. 54 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Brain Informatics by Yao, Yiyu. Publication: . XVI, 440p. 162 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Knowledge Science, Engineering and Management by Bi, Yaxin. Publication: . XIII, 618p. 156 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart