|
|
Self-Organizing Architectures
by Weyns, Danny.
Publication:
. X, 301p. 110 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Information Infrastructures Security
by Rome, Erich.
Publication:
. XII, 213p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Case-Based Reasoning. Research and Development
by Bichindaritz, Isabelle.
Publication:
. 557p. 180 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Web-Age Information Management
by Chen, Lei.
Publication:
. XIX, 785p. 320 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Kreibich, Christian.
Publication:
. XII, 219p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Requirements Engineering: Foundation for Software Quality
by Wieringa, Roel.
Publication:
. XII, 280p. 62 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Automata, Languages and Programming
by Abramsky, Samson.
Publication:
. XXIV, 614p. 78 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Artifical Evolution
by Collet, Pierre.
Publication:
. XII, 207p. 75 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Privacy
by Steinfeld, Ron.
Publication:
. XII, 403p. 40 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mechanisms for Autonomous Management of Networks and Services
by Stiller, Burkhard.
Publication:
. XIII, 179p. 66 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Networked Services and Applications - Engineering, Control and Management
by Aagesen, Finn Arve.
Publication:
. XIII, 275p. 125 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Web Engineering
by Benatallah, Boualem.
Publication:
. 528p. 231 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust and Trustworthy Computing
by Acquisti, Alessandro.
Publication:
. XIII, 441p. 84 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Fast Software Encryption
by Hong, Seokhie.
Publication:
. XI, 385p. 71 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Research into Practice – Reality and Gaps
by Heineman, George T.
Publication:
. X, 183p. 66 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Scientific and Statistical Database Management
by Gertz, Michael.
Publication:
. XV, 660p. 285 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Future Multimedia Networking
by Zeadally, Sherali.
Publication:
. X, 184p. 115 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data and Applications Security and Privacy XXIV
by Foresti, Sara.
Publication:
. XIII, 376p. 80 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Cryptography and Network Security
by Zhou, Jianying.
Publication:
. XIII, 564p. 83 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Knowledge Discovery and Data Mining
by Zaki, Mohammed J.
Publication:
. 520p. 161 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|