//]]>
Information and Communications Security by Chim, Tat Wing. Publication: . XVI, 506 p. 120 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Graph Transformations by Ehrig, Hartmut. Publication: . XII, 427 p. 166 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy in Statistical Databases by Domingo-Ferrer, Josep. Publication: . XII, 365 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Parameterized and Exact Computation by Thilikos, Dimitrios M. Publication: . X, 275 p. 14 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms – ESA 2012 by Epstein, Leah. Publication: . XX, 839 p. 147 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Web-Age Information Management by Bao, Zhifeng. Publication: . XXX, 362 p. 177 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptographic Hardware and Embedded Systems – CHES 2012 by Prouff, Emmanuel. Publication: . XVII, 562 p. 189 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mathematical Foundations of Computer Science 2012 by Rovan, Branislav. Publication: . XV, 825 p. 102 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
DNA Computing and Molecular Programming by Stefanovic, Darko. Publication: . X, 151 p. 51 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Digital Forensics and Watermarking by Shi, Yun Qing. Publication: . X, 512 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Generic and Indexed Programming by Gibbons, Jeremy. Publication: . VII, 259 p. 24 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Similarity Search and Applications by Navarro, Gonzalo. Publication: . X, 247 p. 90 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trends in Functional Programming by Peña, Ricardo. Publication: . X, 195 p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Arithmetic of Finite Fields by Özbudak, Ferruh. Publication: . XII, 247p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Implementation and Application of Automata by Moreira, Nelma. Publication: . XIII, 369 p. 76 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in VLSI Design and Test by Rahaman, Hafizur. Publication: . XXIV, 408 p. 275 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology - AFRICACRYPT 2012 by Mitrokotsa, Aikaterini. Publication: . XI, 424p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Cryptography and Network Security by Bao, Feng. Publication: . XIV, 580p. 107 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Combinatorial Pattern Matching by Kärkkäinen, Juha. Publication: . XIII, 454p. 82 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Scientific and Statistical Database Management by Ailamaki, Anastasia. Publication: . XVII, 654p. 318 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart