|
|
Trustworthy Computing and Services
by Yuan, Yuyu.
Publication:
. XVIII, 739 p. 301 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Infrastructure Protection VI
by Butts, Jonathan.
Publication:
. XVI, 233 p. 66 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
E-Business and Telecommunications
by Obaidat, Mohammad S.
Publication:
. XVI, 536 p. 226 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Communication, Network, and Computing
by Das, Vinu V.
Publication:
. XIV, 459 p. 253 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Forensics and Cyber Crime
by Gladyshev, Pavel.
Publication:
. XII, 297 p. 94 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Internetworking
by Meinel, Christoph.
Publication:
. XIII, 903 p. 426 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Applications for Security, Control and System Engineering
by Kim, Tai-hoon.
Publication:
. XX, 488 p. 228 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network Computing and Information Security
by Lei, Jingsheng.
Publication:
. XX, 829 p. 104 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trends in Enterprise Architecture Research and Practice-Driven Research on Enterprise Transformation
by Aier, Stephan.
Publication:
. XII, 319 p. 77 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Recent Trends in Computer Networks and Distributed Systems Security
by Thampi, Sabu M.
Publication:
. XXI, 508 p. 207 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data-Driven Process Discovery and Analysis
by Aberer, Karl.
Publication:
. X, 213 p. 82 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Digital Forensics VIII
by Peterson, Gilbert.
Publication:
. XVIII, 333 p. 78 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Global Security, Safety and Sustainability & e-Democracy
by Georgiadis, Christos K.
Publication:
. XIV, 290 p. 86 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Understanding High-Dimensional Spaces
by Skillicorn, David B.
Publication:
. IX, 108 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Privacy in Mobile Information and Communication Systems
by Schmidt, Andreas U.
Publication:
. VIII, 130 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
ICT Critical Infrastructures and Society
by Hercheui, Magda David.
Publication:
. X, 399 p. 48 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Future Security
by Aschenbruck, Nils.
Publication:
. Approx. 530 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Engineering Applications of Neural Networks
by Jayne, Chrisina.
Publication:
. Approx. 510 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Convergence and Hybrid Information Technology
by Lee, Geuk.
Publication:
. Approx. 830 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Internet of Things
by Wang, Yongheng.
Publication:
. Approx. 695 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|