|
|
Electronic Government
by Wimmer, Maria A.
Publication:
. XIV, 335 p. 37 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Electronic Government
by Scholl, Hans J.
Publication:
. XIII, 279 p. 30 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligence and Security Informatics
by Chau, Michael.
Publication:
. X, 207p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Analysis of Social Media and Ubiquitous Data
by Atzmueller, Martin.
Publication:
. VIII, 163p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Electronic Government
by Janssen, Marijn.
Publication:
. XVI, 466 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligence and Security Informatics
by Chau, Michael.
Publication:
. X, 133p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Privacy Management and Autonomous Spontaneous Security
by Garcia-Alfaro, Joaquin.
Publication:
. XII, 265p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Resistance, Liberation Technology and Human Rights in the Digital Age
by Ziccardi, Giovanni.
Publication:
. VIII, 328 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Second Generation Biometrics: The Ethical, Legal and Social Context
by Mordini, Emilio.
Publication:
. X, 353p. 59 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
European Data Protection: In Good Health?
by Gutwirth, Serge.
Publication:
. XVIII, 363p. 20 illus., 10 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Legislative XML for the Semantic Web
by Sartor, Giovanni.
Publication:
. XI, 190 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Identity Theft
by van der Meulen, Nicole S.
Publication:
. XIV, 306 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Internet of Things
by Weber, Rolf H.
Publication:
. XXIV, 129p. 9 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Shaping Internet Governance: Regulatory Challenges
by Weber, Rolf H.
Publication:
. XXXIX, 280p. 4 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Infrastructure Protection VII
by Butts, Jonathan.
Publication:
. XVI, 227 p. 68 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Open Source Software: Quality Verification
by Petrinja, Etiel.
Publication:
. XIV, 277 p. 67 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Multimedia Communications, Services and Security
by Dziech, Andrzej.
Publication:
. XIV, 325 p. 139 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Infrastructure Protection VI
by Butts, Jonathan.
Publication:
. XVI, 233 p. 66 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Auctions, Market Mechanisms, and Their Applications
by Coles, Peter.
Publication:
. XII, 113 p. 16 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Forensics in Telecommunications, Information, and Multimedia
by Lai, Xuejia.
Publication:
. XIII, 314p.
Availability:
Copies available:
AUM Main Library
(1),
|
|