|
|
Proceedings of the 2011 International Conference on Informatics, Cybernetics, and Computer Engineering (ICCE2011) November 19-20, 2011, Melbourne, Australia
by Jiang, Liangzhong.
Publication:
. XVI, 720p. 314 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Architecting the Internet of Things
by Uckelmann, Dieter.
Publication:
. XXXI, 351p. 77 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Intelligent Decision Technologies
by Phillips-Wren, Gloria.
Publication:
. 730p. 225 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Uncertainty Theory
by Liu, Baoding.
Publication:
. 350p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Intelligence for Technology Enhanced Learning
by Xhafa, Fatos.
Publication:
. 250p. 63 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Web and Internet Economics
by Chen, Yiling.
Publication:
. XIV, 440 p. 25 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
PRIMA 2013: Principles and Practice of Multi-Agent Systems
by Boella, Guido.
Publication:
. XVIII, 536 p. 158 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithmic Game Theory
by Vöcking, Berthold.
Publication:
. XII, 271 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Radio Frequency Identification
by Hutter, Michael.
Publication:
. XIV, 177 p. 59 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Adams, Andrew A.
Publication:
. XII, 239 p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Research in Attacks, Intrusions, and Defenses
by Stolfo, Salvatore J.
Publication:
. XII, 476 p. 139 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Provable Security
by Susilo, Willy.
Publication:
. X, 347 p. 36 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Communications and Multimedia Security
by Decker, Bart.
Publication:
. XIV, 249 p. 83 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Availability, Reliability, and Security in Information Systems and HCI
by Cuzzocrea, Alfredo.
Publication:
. XVI, 504 p. 156 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mobile Web Information Systems
by Daniel, Florian.
Publication:
. XVI, 306 p. 94 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Security – ESORICS 2013
by Crampton, Jason.
Publication:
. XVIII, 794 p. 158 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Sadeghi, Ahmad-Reza.
Publication:
. XVI, 406 p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Human Aspects of Information Security, Privacy, and Trust
by Marinos, Louis.
Publication:
. XX, 378 p. 102 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Rieck, Konrad.
Publication:
. XII, 207 p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Privacy
by Boyd, Colin.
Publication:
. XII, 437 p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|