//]]>
Network and System Security by Xu, Li. Publication: . XIV, 532 p. 133 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Artificial Intelligence - SBIA 2012 by Barros, Leliane N. Publication: . XVI, 233 p. 77 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security, Privacy, and Applied Cryptography Engineering by Bogdanov, Andrey. Publication: . XII, 173 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Human-Centered Software Engineering by Winckler, Marco. Publication: . XII, 370 p. 121 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Simulation, Modeling, and Programming for Autonomous Robots by Noda, Itsuki. Publication: . XIV, 414 p. 198 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented Computing by Liu, Chengfei. Publication: . XX, 795 p. 258 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Computer Entertainment by Nijholt, Anton. Publication: . XXIV, 599 p. 337 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Methods and Software Engineering by Aoki, Toshiaki. Publication: . XIV, 512 p. 131 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Decision and Game Theory for Security by Grossklags, Jens. Publication: . XII, 309 p. 48 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cultural Heritage Preservation by Ioannides, Marinos. Publication: . XXVI, 900 p. 494 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Search Computing by Ceri, Stefano. Publication: . XII, 255 p. 95 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Geometry by Márquez, Alberto. Publication: . X, 283 p. 176 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information and Communications Security by Chim, Tat Wing. Publication: . XVI, 506 p. 120 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Information and Computer Security by Hanaoka, Goichiro. Publication: . XII, 261 p. 33 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Computing and Applications by Liu, Baoxiang. Publication: . XX, 782 p. 262 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Large-Scale Complex IT Systems. Development, Operation and Management by Calinescu, Radu. Publication: . XII, 417 p. 143 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fast Software Encryption by Canteaut, Anne. Publication: . XII, 463 p. 82 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in New Technologies, Interactive Interfaces and Communicability by Cipolla-Ficarra, Francisco. Publication: . XII, 263 p. 101 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Knowledge Engineering and Knowledge Management by Teije, Annette. Publication: . XVIII, 452 p. 102 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory and Practice of Natural Computing by Dediu, Adrian-Horia. Publication: . X, 227 p. 76 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart