|
|
Applied Cryptography and Network Security
by Jacobson, Michael.
Publication:
. XIV, 572 p. 115 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
SDL 2013: Model-Driven Dependability Engineering
by Khendek, Ferhat.
Publication:
. XII, 291 p. 138 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust and Trustworthy Computing
by Huth, Michael.
Publication:
. XIV, 278 p. 85 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computing and Combinatorics
by Du, Ding-Zhu.
Publication:
. XVIII, 861 p. 220 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Benchmarking Peer-to-Peer Systems
by Effelsberg, Wolfgang.
Publication:
. VIII, 197 p. 57 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network and System Security
by Lopez, Javier.
Publication:
. XX, 793 p. 207 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Web-Age Information Management
by Wang, Jianyong.
Publication:
. XXVIII, 812 p. 326 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Applications and Interoperable Systems
by Dowling, Jim.
Publication:
. XII, 205 p. 75 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems
by Cavallaro, Lorenzo.
Publication:
. XVI, 145 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Coordination Models and Languages
by Nicola, Rocco.
Publication:
. XIV, 251 p. 76 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Wired/Wireless Internet Communication
by Tsaoussidis, Vassilis.
Publication:
. XII, 277 p. 145 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithms and Complexity
by Spirakis, Paul G.
Publication:
. XIV, 384 p. 75 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advanced Infocomm Technology
by Guyot, Vincent.
Publication:
. XVI, 358 p. 153 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Model-Based Methodologies for Pervasive and Embedded Software
by Machado, Ricardo J.
Publication:
. X, 139 p. 61 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Future Internet
by Galis, Alex.
Publication:
. XLIV, 369 p. 131 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Communication Technologies for Vehicles
by Berbineau, Marion.
Publication:
. XIV, 253 p. 101 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Flegel, Ulrich.
Publication:
. X, 243 p. 86 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Smart Card Research and Advanced Applications
by Mangard, Stefan.
Publication:
. XII, 297 p. 98 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Social Computing, Behavioral-Cultural Modeling and Prediction
by Greenberg, Ariel M.
Publication:
. XVI, 535 p. 166 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applications of Evolutionary Computation
by Esparcia-Alcázar, Anna I.
Publication:
. XXVIII, 639 p. 210 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|