|
|
Transactions on Large-Scale Data- and Knowledge-Centered Systems X
by Hameurlain, Abdelkader.
Publication:
. XII, 201 p. 91 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Electronic Government
by Wimmer, Maria A.
Publication:
. XIV, 335 p. 37 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Electronic Participation
by Wimmer, Maria A.
Publication:
. X, 159 p. 39 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Large-Scale Data- and Knowledge-Centered Systems IX
by Hameurlain, Abdelkader.
Publication:
. X, 123 p. 35 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Sadeghi, Ahmad-Reza.
Publication:
. XVI, 406 p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory, Practice, and Applications of Rules on the Web
by Morgenstern, Leora.
Publication:
. XVIII, 249 p. 69 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
E-Voting and Identify
by Heather, James.
Publication:
. X, 211 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Radio Frequency Identification. Security and Privacy Issues
by Hoepman, Jaap-Henk.
Publication:
. X, 181 p. 37 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trusted Systems
by Mitchell, Chris J.
Publication:
. X, 117 p. 20 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Knowledge Engineering and Knowledge Management
by Teije, Annette.
Publication:
. XVIII, 452 p. 102 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Electronic Participation
by Tambouris, Efthimios.
Publication:
. X, 171 p. 38 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Cryptography for Networks
by Visconti, Ivan.
Publication:
. XI, 582 p. 75 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
E-Voting and Identity
by Kiayias, Aggelos.
Publication:
. X, 257 p. 26 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Formal Methods for Industrial Critical Systems
by Stoelinga, Mariëlle.
Publication:
. XIV, 223 p. 87 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trusted Systems
by Chen, Liqun.
Publication:
. XII, 351 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust, Privacy and Security in Digital Business
by Fischer-Hübner, Simone.
Publication:
. XI, 242 p. 82 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service-Oriented Computing - ICSOC 2011 Workshops
by Pallis, George.
Publication:
. XII, 334 p. 106 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Deontic Logic in Computer Science
by Ågotnes, Thomas.
Publication:
. XII, 215 p. 21 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advanced Information Systems Engineering
by Ralyté, Jolita.
Publication:
. XVII, 704p. 235 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Economics of Converged, Internet-Based Networks
by Cohen, Johanne.
Publication:
. IX, 75p. 25 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|