books by publisher
BCS

Justification Based Explanation in Ontologies (Distinguished Dissertation)

First International Symposium for ICS & Scada Cyber Security Research 2013

Second International Symposium for ICS & SCADA Cyber Security Research 2014

Third International Symposium for ICS & SCADA Cyber Security Research 2015

4th International Symposium for ICS & SCADA Cyber Security Research 2016 (Electronic workshops in computing)

Verification of Message Passing Concurrent Systems (Distinguished Dissertation)

Invisible Architecture: The Benefits of Aligning People, Process & Technology: Case Studies for System Designers & Managers

A Guide to Global Sourcing: Offshore Outsourcing and Other Global Delivery Models

Green It for Sustainable Business Practice: An Iseb Foundation Guide

Using Machine-Learning to Efficiently Explore the Architecture/Compiler Co-Design Space (Distinguished Dissertation)

Formal Verification of Machine-Code Programs (Distinguished Dissertation)

Logics and Analyses for Concurrent Heap-Manipulating Programs (Distinguished Dissertation)

Communication Locality in Computation: Software, Chip Multiprocessors and Brains (Distinguished Dissertation)
