|
|
Network and Parallel Computing
by Park, James J.
Publication:
. XX, 647 p. 253 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service-Oriented Computing
by Maglio, Paul P.
Publication:
. XX, 737p. 285 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Security – ESORICS 2010
by Gritzalis, Dimitris.
Publication:
. XIV, 718p. 163 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trustworthy Ubiquitous Computing
by Khalil, Ismail.
Publication:
. XIX, 267 p. 117 illus., 47 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cyber Security and Privacy
by Felici, Massimo.
Publication:
. XIV, 177 p. 44 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mobile Wireless Middleware, Operating Systems, and Applications
by Cai, Ying.
Publication:
. XVI, 508p. 209 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Economics of Information Security and Privacy III
by Schneier, Bruce.
Publication:
. X, 283 p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network Intrusion Detection and Prevention
by Ghorbani, Ali A.
Publication:
Availability:
Copies available:
AUM Main Library
(1),
|
|