//]]>
Applied Cryptography and Network Security by Bao, Feng. Publication: . XIV, 580p. 107 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Combinatorial Pattern Matching by Kärkkäinen, Juha. Publication: . XIII, 454p. 82 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Scientific and Statistical Database Management by Ailamaki, Anastasia. Publication: . XVII, 654p. 318 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithm Theory – SWAT 2012 by Fomin, Fedor V. Publication: . XIII, 410p. 62 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Application and Theory of Petri Nets by Haddad, Serge. Publication: . XI, 419p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Structural Information and Communication Complexity by Even, Guy. Publication: . XIII, 340 p. 54 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems by Askoxylakis, Ioannis. Publication: . XII, 225p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fun with Algorithms by Kranakis, Evangelos. Publication: . XI, 397p. 148 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory and Applications of Models of Computation by Agrawal, Manindra. Publication: . XV, 622 p. 91 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Semantic Web by Pan, Jeff Z. Publication: . XIII, 436p. 119 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Frontiers in Algorithmics and Algorithmic Aspects in Information and Management by Snoeyink, Jack. Publication: . XVII, 370 p. 77 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Research in Computational Molecular Biology by Chor, Benny. Publication: . XVI, 372p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Technology for Applications by Laud, Peeter. Publication: . X, 273 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics by Giacobini, Mario. Publication: . XIII, 255p. 76 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Engineering Secure Software and Systems by Barthe, Gilles. Publication: . XII, 151p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Large-Scale Data- and Knowledge-Centered Systems V by Hameurlain, Abdelkader. Publication: . IX, 223 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Technology for Applications by Aura, Tuomas. Publication: . X, 289 p. 73 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Graph-Theoretic Concepts in Computer Science by Kolman, Petr. Publication: . XI, 344 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Security and Security Data by MacKinnon, Lachlan M. Publication: . X, 155 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Retrieval Technology by Salem, Mohamed Vall Mohamed. Publication: . XV, 626 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart