|
|
Enterprise Interoperability V
by Poler, Raúl.
Publication:
. XIII, 479p. 172 illus., 125 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Innovative Tools for Business Coalitions in B2B Applications
by Argoneto, Pierluigi.
Publication:
. IX, 160p. 38 illus., 13 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service-Oriented Computing
by Basu, Samik.
Publication:
. XVIII, 713 p. 260 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
PRIMA 2013: Principles and Practice of Multi-Agent Systems
by Boella, Guido.
Publication:
. XVIII, 536 p. 158 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Adams, Andrew A.
Publication:
. XII, 239 p. 64 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Research in Attacks, Intrusions, and Defenses
by Stolfo, Salvatore J.
Publication:
. XII, 476 p. 139 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Provable Security
by Susilo, Willy.
Publication:
. X, 347 p. 36 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Communications and Multimedia Security
by Decker, Bart.
Publication:
. XIV, 249 p. 83 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service-Oriented and Cloud Computing
by Lau, Kung-Kiu.
Publication:
. X, 244 p. 80 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Availability, Reliability, and Security in Information Systems and HCI
by Cuzzocrea, Alfredo.
Publication:
. XVI, 504 p. 156 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mobile Web Information Systems
by Daniel, Florian.
Publication:
. XVI, 306 p. 94 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Security – ESORICS 2013
by Crampton, Jason.
Publication:
. XVIII, 794 p. 158 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Sadeghi, Ahmad-Reza.
Publication:
. XVI, 406 p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Product-Focused Software Process Improvement
by Heidrich, Jens.
Publication:
. XVI, 374 p. 87 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Detection of Intrusions and Malware, and Vulnerability Assessment
by Rieck, Konrad.
Publication:
. XII, 207 p. 55 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Privacy
by Boyd, Colin.
Publication:
. XII, 437 p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
User Modeling, Adaptation, and Personalization
by Carberry, Sandra.
Publication:
. XXVI, 416 p. 120 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Design Science at the Intersection of Physical and Virtual Design
by Brocke, Jan.
Publication:
. XVI, 528 p. 130 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advanced Information Systems Engineering
by Salinesi, Camille.
Publication:
. XXXVIII, 706 p. 258 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network and System Security
by Lopez, Javier.
Publication:
. XX, 793 p. 207 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|