|
|
Cooperating embedded systems and wireless sensor networks /
Publication:
London : ISTE, 2008
. 418 p. :
25 cm.
Date:2008
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Next Generation Data Technologies for Collective Computational Intelligence
by Bessis, Nik.
Publication:
. XVIII, 638 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Control and Optimization Methods for Electric Smart Grids
by Chakrabortty, Aranya.
Publication:
. XVI, 372 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network and Parallel Computing
by Park, James J.
Publication:
. XX, 647 p. 253 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Secure IT Systems
by Jøsang, Audun.
Publication:
. X, 247 p. 62 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service-Oriented Computing
by Maglio, Paul P.
Publication:
. XX, 737p. 285 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computer Security – ESORICS 2010
by Gritzalis, Dimitris.
Publication:
. XIV, 718p. 163 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligent Information and Database Systems
by Nguyen, Ngoc Thanh.
Publication:
. XXIII, 477p. 196 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Complex Intelligent Systems and Their Applications
by Xhafa, Fatos.
Publication:
. XIV, 274 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Trustworthy Ubiquitous Computing
by Khalil, Ismail.
Publication:
. XIX, 267 p. 117 illus., 47 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cyber Security and Privacy
by Felici, Massimo.
Publication:
. XIV, 177 p. 44 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Understanding High-Dimensional Spaces
by Skillicorn, David B.
Publication:
. IX, 108 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Information Security
by Basin, David.
Publication:
. XIV, 202 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mobile Wireless Middleware, Operating Systems, and Applications
by Cai, Ying.
Publication:
. XVI, 508p. 209 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Service Oriented Infrastructures and Cloud Service Platforms for the Enterprise
by Dimitrakos, Theo.
Publication:
. XV, 210 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Computational Analysis of Terrorist Groups: Lashkar-e-Taiba
by Subrahmanian, V.S.
Publication:
. XIV, 231 p. 23 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Economics of Information Security and Privacy III
by Schneier, Bruce.
Publication:
. X, 283 p. 60 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network Intrusion Detection and Prevention
by Ghorbani, Ali A.
Publication:
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Introduction to Biometrics
by Jain, Anil K.
Publication:
. XVI, 312 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Managing Risk and Information Security
by Harkins, Malcolm.
Publication:
. XVII, 152 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|