|
|
Health Information Science
by Huang, Guangyan.
Publication:
. XIV, 280 p. 92 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service-Oriented Computing - ICSOC 2012 Workshops
by Ghose, Aditya.
Publication:
. XVI, 466 p. 153 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Large-Scale Data- and Knowledge-Centered Systems VIII
by Hameurlain, Abdelkader.
Publication:
. XII, 197 p. 99 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Social Computing, Behavioral-Cultural Modeling and Prediction
by Greenberg, Ariel M.
Publication:
. XVI, 535 p. 166 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Foundations and Practice of Security
by Garcia-Alfaro, Joaquin.
Publication:
. XIV, 383 p. 90 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Selected Topics in Performance Evaluation and Benchmarking
by Nambiar, Raghunath.
Publication:
. XIV, 209 p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Combinatorial Algorithms
by Arumugam, S.
Publication:
. XII, 303 p. 136 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trusted Systems
by Mitchell, Chris J.
Publication:
. X, 117 p. 20 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Electronic Government
by Scholl, Hans J.
Publication:
. XIII, 279 p. 30 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Provable Security
by Takagi, Tsuyoshi.
Publication:
. XIII, 337 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Keromytis, Angelos D.
Publication:
. XI, 416 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Cryptography for Networks
by Visconti, Ivan.
Publication:
. XI, 582 p. 75 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Topics in Performance Evaluation, Measurement and Characterization
by Nambiar, Raghunath.
Publication:
. XIV, 213 p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
ICT as Key Technology against Global Warming
by Auweter, Axel.
Publication:
. IX, 127 p. 56 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Warehousing and Knowledge Discovery
by Cuzzocrea, Alfredo.
Publication:
. XIII, 454 p. 198 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Business System Management and Engineering
by Ardagna, Claudio A.
Publication:
. X, 197 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trusted Systems
by Chen, Liqun.
Publication:
. XII, 351 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust, Privacy and Security in Digital Business
by Fischer-Hübner, Simone.
Publication:
. XI, 242 p. 82 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Similarity Search and Applications
by Navarro, Gonzalo.
Publication:
. X, 247 p. 90 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service-Oriented Computing - ICSOC 2011 Workshops
by Pallis, George.
Publication:
. XII, 334 p. 106 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|