|
|
Business System Management and Engineering
by Ardagna, Claudio A.
Publication:
. X, 197 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Theoretic Security
by Smith, Adam.
Publication:
. XI, 219 p. 28 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Computational Collective Intelligence VII
by Nguyen, Ngoc Thanh.
Publication:
. XI, 237 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
User Modeling, Adaptation, and Personalization
by Masthoff, Judith.
Publication:
. XVIII, 396p. 105 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Privacy
by Susilo, Willy.
Publication:
. XIV, 460p. 46 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Agent and Multi-Agent Systems. Technologies and Applications
by Jezic, Gordan.
Publication:
. XVII, 661p. 226 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Danezis, George.
Publication:
. XII, 185 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Technology for Applications
by Aura, Tuomas.
Publication:
. X, 289 p. 73 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithmic Game Theory
by Persiano, Giuseppe.
Publication:
. XI, 327p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Economics of Converged, Internet-Based Networks
by Cohen, Johanne.
Publication:
. IX, 75p. 25 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Human Interface and the Management of Information. Interacting with Information
by Smith, Michael J.
Publication:
. XXX, 673p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Human-Computer Interaction. Users and Applications
by Jacko, Julie A.
Publication:
. XXIV, 711 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithmic Game Theory
by Kontogiannis, Spyros.
Publication:
. VIII, 359p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Sion, Radu.
Publication:
. X, 257p. 33 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Identity Theft
by van der Meulen, Nicole S.
Publication:
. XIV, 306 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cybercrimes: A Multidisciplinary Analysis
by Ghosh, Sumit.
Publication:
. XIX, 414p. 7 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
CyberForensics
by Bayuk, Jennifer.
Publication:
. XIV, 170 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Targeted Advertising Technologies in the ICT Space
by Schlee, Christian.
Publication:
. XXVI, 339 p. 80 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
IT Enabled Services
by Uesugi, Shiro.
Publication:
. IX, 247 p. 77 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mobile Payment
by Lerner, Thomas.
Publication:
. X, 180 p. 94 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|