//]]>
Applied Cryptography and Network Security by Jacobson, Michael. Publication: . XIV, 572 p. 115 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
SDL 2013: Model-Driven Dependability Engineering by Khendek, Ferhat. Publication: . XII, 291 p. 138 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trust and Trustworthy Computing by Huth, Michael. Publication: . XIV, 278 p. 85 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computing and Combinatorics by Du, Ding-Zhu. Publication: . XVIII, 861 p. 220 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Benchmarking Peer-to-Peer Systems by Effelsberg, Wolfgang. Publication: . VIII, 197 p. 57 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network and System Security by Lopez, Javier. Publication: . XX, 793 p. 207 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web-Age Information Management by Wang, Jianyong. Publication: . XXVIII, 812 p. 326 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Applications and Interoperable Systems by Dowling, Jim. Publication: . XII, 205 p. 75 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems by Cavallaro, Lorenzo. Publication: . XVI, 145 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Coordination Models and Languages by Nicola, Rocco. Publication: . XIV, 251 p. 76 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Wired/Wireless Internet Communication by Tsaoussidis, Vassilis. Publication: . XII, 277 p. 145 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms and Complexity by Spirakis, Paul G. Publication: . XIV, 384 p. 75 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Infocomm Technology by Guyot, Vincent. Publication: . XVI, 358 p. 153 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Model-Based Methodologies for Pervasive and Embedded Software by Machado, Ricardo J. Publication: . X, 139 p. 61 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Future Internet by Galis, Alex. Publication: . XLIV, 369 p. 131 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Communication Technologies for Vehicles by Berbineau, Marion. Publication: . XIV, 253 p. 101 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Detection of Intrusions and Malware, and Vulnerability Assessment by Flegel, Ulrich. Publication: . X, 243 p. 86 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Smart Card Research and Advanced Applications by Mangard, Stefan. Publication: . XII, 297 p. 98 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Social Computing, Behavioral-Cultural Modeling and Prediction by Greenberg, Ariel M. Publication: . XVI, 535 p. 166 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applications of Evolutionary Computation by Esparcia-Alcázar, Anna I. Publication: . XXVIII, 639 p. 210 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart