|
|
Canadian Semantic Web
by Du, Weichang.
Publication:
. XV, 217p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Handbook of Social Network Technologies and Applications
by Furht, Borko.
Publication:
. XVIII, 716p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Insider Threats in Cyber Security
by Probst, Christian W.
Publication:
. XII, 244 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Economics of Information Security and Privacy
by Moore, Tyler.
Publication:
. XVI, 320p. 100 illus., 50 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Grids, P2P and Services Computing
by Desprez, Frédéric.
Publication:
. XIV, 202p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Adaptive Cryptographic Access Control
by Kayem, Anne V. D. M.
Publication:
. XIV, 138 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Association Rule Hiding for Data Mining
by Gkoulalas-Divanis, Aris.
Publication:
. XX, 138p. 120 illus., 60 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Managed Grids and Cloud Systems in the Asia-Pacific Research Community
by Lin, Simon C.
Publication:
. XIV, 359p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Open Source Software for Digital Forensics
by Huebner, Ewa.
Publication:
. VII, 117p. 40 illus., 20 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Domain Driven Data Mining
by Cao, Longbing.
Publication:
. XIII, 237p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Multi-Modal User Interactions in Controlled Environments
by Djeraba, Chaabane.
Publication:
. XVI, 216p. 40 illus., 20 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cyber Situational Awareness
by Jajodia, Sushil.
Publication:
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Encryption for Digital Content
by Kiayias, Aggelos.
Publication:
. XIII, 209 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
International Handbook of Internet Research
by Hunsinger, Jeremy.
Publication:
. XX, 512p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transparent User Authentication
by Clarke, Nathan.
Publication:
. XVIII, 229p. 98 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Guide to e-Science
by Yang, Xiaoyu.
Publication:
. XXVIII, 540 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Social Media Modeling and Computing
by Hoi, Steven C.H.
Publication:
. VIII, 276p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Systems Safety
by Dale, Chris.
Publication:
. X, 315p. 62 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Elements of Computer Security
by Salomon, David.
Publication:
. XX, 375p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network Intrusion Detection and Prevention
by Ghorbani, Ali A.
Publication:
Availability:
Copies available:
AUM Main Library
(1),
|
|