|
|
Human-Computer Interaction. Interaction Modalities and Techniques
by Kurosu, Masaaki.
Publication:
. XXIV, 768 p. 395 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Human-Computer Interaction. Users and Contexts of Use
by Kurosu, Masaaki.
Publication:
. XXII, 514 p. 171 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data and Applications Security and Privacy XXVII
by Wang, Lingyu.
Publication:
. XIV, 305 p. 71 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Ad-hoc, Mobile, and Wireless Network
by Cichoń, Jacek.
Publication:
. XIV, 329 p. 150 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Rieck, Konrad.
Publication:
. XII, 207 p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Human Interface and the Management of Information. Information and Interaction for Learning, Culture, Collaboration and Business,
by Yamamoto, Sakae.
Publication:
. XXIII, 665 p. 325 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Human Interface and the Management of Information. Information and Interaction for Health, Safety, Mobility and Complex Environments
by Yamamoto, Sakae.
Publication:
. XXIII, 619 p. 314 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Automata, Languages, and Programming
by Fomin, Fedor V.
Publication:
. XXVI, 698 p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Automata, Languages, and Programming
by Fomin, Fedor V.
Publication:
. XXVI, 854 p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
E-Voting and Identify
by Heather, James.
Publication:
. X, 211 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cross-Cultural Design. Cultural Differences in Everyday Life
by Rau, P. L. Patrick.
Publication:
. XXVIII, 488 p. 144 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Symbolic and Quantitative Approaches to Reasoning with Uncertainty
by Gaag, Linda C.
Publication:
. XII, 536 p. 62 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Privacy Enhancing Technologies
by Cristofaro, Emiliano.
Publication:
. X, 265 p. 88 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Human Factors in Computing and Informatics
by Holzinger, Andreas.
Publication:
. XXIV, 845 p. 294 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Software Architecture
by Drira, Khalil.
Publication:
. XVI, 354 p. 133 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Modelling Foundations and Applications
by Gorp, Pieter.
Publication:
. X, 237 p. 93 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Emerging Management Mechanisms for the Future Internet
by Doyen, Guillaume.
Publication:
. XVI, 161 p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Cryptography and Network Security
by Jacobson, Michael.
Publication:
. XIV, 572 p. 115 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
SDL 2013: Model-Driven Dependability Engineering
by Khendek, Ferhat.
Publication:
. XII, 291 p. 138 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trust and Trustworthy Computing
by Huth, Michael.
Publication:
. XIV, 278 p. 85 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|