//]]>
Self-Organizing Architectures by Weyns, Danny. Publication: . X, 301p. 110 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Information Infrastructures Security by Rome, Erich. Publication: . XII, 213p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Case-Based Reasoning. Research and Development by Bichindaritz, Isabelle. Publication: . 557p. 180 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web-Age Information Management by Chen, Lei. Publication: . XIX, 785p. 320 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Detection of Intrusions and Malware, and Vulnerability Assessment by Kreibich, Christian. Publication: . XII, 219p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Requirements Engineering: Foundation for Software Quality by Wieringa, Roel. Publication: . XII, 280p. 62 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automata, Languages and Programming by Abramsky, Samson. Publication: . XXIV, 614p. 78 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Artifical Evolution by Collet, Pierre. Publication: . XII, 207p. 75 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Steinfeld, Ron. Publication: . XII, 403p. 40 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mechanisms for Autonomous Management of Networks and Services by Stiller, Burkhard. Publication: . XIII, 179p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Networked Services and Applications - Engineering, Control and Management by Aagesen, Finn Arve. Publication: . XIII, 275p. 125 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web Engineering by Benatallah, Boualem. Publication: . 528p. 231 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust and Trustworthy Computing by Acquisti, Alessandro. Publication: . XIII, 441p. 84 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fast Software Encryption by Hong, Seokhie. Publication: . XI, 385p. 71 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Research into Practice – Reality and Gaps by Heineman, George T. Publication: . X, 183p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Scientific and Statistical Database Management by Gertz, Michael. Publication: . XV, 660p. 285 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Future Multimedia Networking by Zeadally, Sherali. Publication: . X, 184p. 115 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data and Applications Security and Privacy XXIV by Foresti, Sara. Publication: . XIII, 376p. 80 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Cryptography and Network Security by Zhou, Jianying. Publication: . XIII, 564p. 83 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Knowledge Discovery and Data Mining by Zaki, Mohammed J. Publication: . 520p. 161 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart