|
|
Analysis of Social Media and Ubiquitous Data
by Atzmueller, Martin.
Publication:
. VIII, 163p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure Data Management
by Jonker, Willem.
Publication:
. X, 170p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Warehousing and Knowledge Discovery
by Cuzzocrea, Alfredo.
Publication:
. XIV, 498p. 180 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Energy-Aware Communications
by Lehnert, Ralf.
Publication:
. XIII, 227 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Electronic Participation
by Tambouris, Efthimios.
Publication:
. XI, 315 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Availability, Reliability and Security for Business, Enterprise and Health Information Systems
by Tjoa, A Min.
Publication:
. XIII, 388 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Electronic Government and the Information Systems Perspective
by Andersen, Kim Normann.
Publication:
. XIV, 410p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Haptic and Audio Interaction Design
by Cooper, Eric W.
Publication:
. XII, 135 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust, Privacy and Security in Digital Business
by Furnell, Steven.
Publication:
. XII, 223 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Electronic Government
by Janssen, Marijn.
Publication:
. XVI, 466 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – CRYPTO 2011
by Rogaway, Phillip.
Publication:
. XV, 782p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public Key Infrastructures, Services and Applications
by Camenisch, Jan.
Publication:
. XII, 209 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Computational Science XIII
by Gavrilova, Marina L.
Publication:
. XX, 205 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security and Trust Management
by Cuellar, Jorge.
Publication:
. X, 271 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Collaborative Agents - Research and Development
by Guttmann, Christian.
Publication:
. VIII, 187p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Holz, Thorsten.
Publication:
. X, 235p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Computational Science XII
by Gavrilova, Marina L.
Publication:
. XIV, 279 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Natural Language Processing and Information Systems
by Muñoz, Rafael.
Publication:
. XV, 350 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy Enhancing Technologies
by Fischer-Hübner, Simone.
Publication:
. X, 285 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligence and Security Informatics
by Chau, Michael.
Publication:
. X, 133p.
Availability:
Copies available:
AUM Main Library
(1),
|
|