|
|
Computer Safety, Reliability, and Security
by Bitsch, Friedemann.
Publication:
. XVI, 304 p. 109 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service-Oriented and Cloud Computing
by Lau, Kung-Kiu.
Publication:
. X, 244 p. 80 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Aided Verification
by Sharygina, Natasha.
Publication:
. XXII, 1015 p. 237 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Science and Its Applications – ICCSA 2013
by Murgante, Beniamino.
Publication:
. XXXVI, 679 p. 276 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Science and Its Applications – ICCSA 2013
by Murgante, Beniamino.
Publication:
. XXXVI, 729 p. 317 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Interactive Theorem Proving
by Blazy, Sandrine.
Publication:
. XII, 498 p. 73 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Rieck, Konrad.
Publication:
. XII, 207 p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
E-Voting and Identify
by Heather, James.
Publication:
. X, 211 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Emerging Management Mechanisms for the Future Internet
by Doyen, Guillaume.
Publication:
. XVI, 161 p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems
by Cavallaro, Lorenzo.
Publication:
. XVI, 145 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advanced Infocomm Technology
by Guyot, Vincent.
Publication:
. XVI, 358 p. 153 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service-Oriented Computing - ICSOC 2012 Workshops
by Ghose, Aditya.
Publication:
. XVI, 466 p. 153 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Smart Card Research and Advanced Applications
by Mangard, Stefan.
Publication:
. XII, 297 p. 98 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Foundations and Practice of Security
by Garcia-Alfaro, Joaquin.
Publication:
. XIV, 383 p. 90 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Fundamental Approaches to Software Engineering
by Cortellessa, Vittorio.
Publication:
. XX, 376 p. 90 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Pervasive Computing and the Networked World
by Zu, Qiaohong.
Publication:
. XXII, 921 p. 434 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Engineering Secure Software and Systems
by Jürjens, Jan.
Publication:
. XII, 231 p. 40 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Radio Frequency Identification. Security and Privacy Issues
by Hoepman, Jaap-Henk.
Publication:
. X, 181 p. 37 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Formal Methods for Components and Objects
by Beckert, Bernhard.
Publication:
. X, 356 p. 129 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Formal Aspects of Component Software
by Arbab, Farhad.
Publication:
. X, 369 p. 131 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|