|
|
Online Communities and Social Computing
by Ozok, A. Ant.
Publication:
. XX, 388p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Human Centered Design
by Kurosu, Masaaki.
Publication:
. XIV, 609p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory and Practice of Model Transformations
by Cabot, Jordi.
Publication:
. XII, 229p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Pervasive Computing
by Lyons, Kent.
Publication:
. XIII, 370 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Analytical and Stochastic Modeling Techniques and Applications
by Al-Begain, Khalid.
Publication:
. XI, 347p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Design, User Experience, and Usability. Theory, Methods, Tools and Practice
by Marcus, Aaron.
Publication:
. XXXI, 676 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Fast Software Encryption
by Joux, Antoine.
Publication:
. XI, 417p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Information Infrastructures Security
by Xenakis, Christos.
Publication:
. X, 161p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Design, User Experience, and Usability. Theory, Methods, Tools and Practice
by Marcus, Aaron.
Publication:
. XXXI, 718 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Internationalization, Design and Global Development
by Rau, P. L. Patrick.
Publication:
. XXVIII, 699p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
System Analysis and Modeling: About Models
by Kraemer, Frank Alexander.
Publication:
. X, 257p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advanced Information Systems Engineering
by Mouratidis, Haralambos.
Publication:
. XVIII, 684p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Human-Computer Interaction. Towards Mobile and Intelligent Interaction Environments
by Jacko, Julie A.
Publication:
. XXIII, 621 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Human-Computer Interaction. Design and Development Approaches
by Jacko, Julie A.
Publication:
. XLVI, 703 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust and Trustworthy Computing
by McCune, Jonathan M.
Publication:
. VII, 314p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Wired/Wireless Internet Communications
by Masip-Bruin, Xavier.
Publication:
. XV, 506 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Cryptography and Network Security
by Lopez, Javier.
Publication:
. XIII, 552 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network Optimization
by Pahl, Julia.
Publication:
. XIV, 670 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Swarm Intelligence
by Tan, Ying.
Publication:
. XXVI, 587p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology
by Lai, Xuejia.
Publication:
. XIV, 524p.
Availability:
Copies available:
AUM Main Library
(1),
|
|