|
|
Arithmetic of Finite Fields
by Hasan, M. Anwar.
Publication:
. 280p. 41 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Future Multimedia Networking
by Zeadally, Sherali.
Publication:
. X, 184p. 115 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Engineering Secure Software and Systems
by Massacci, Fabio.
Publication:
. X, 241 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Crossing of Heaven
by Gustafson, Karl.
Publication:
. XVI, 176 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Classification and Multivariate Analysis for Complex Data Structures
by Fichet, Bernard.
Publication:
. XIX, 473p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Rainbow Connections of Graphs
by Li, Xueliang.
Publication:
. VIII, 103p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Crittografia nel Paese delle Meraviglie
by Venturi, Daniele.
Publication:
. XIV, 500 pagg.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Physically Unclonable Functions
by Maes, Roel.
Publication:
. XVII, 193 p. 28 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Modern Cryptography Primer
by Kościelny, Czesław.
Publication:
. XIV, 238 p. 97 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Introduction to Public Key Infrastructures
by Buchmann, Johannes A.
Publication:
. XV, 194 p. 146 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Bluetooth Security Attacks
by Haataja, Keijo.
Publication:
. VII, 93 p. 31 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Economics of Information Security and Privacy
by Böhme, Rainer.
Publication:
. XIII, 321 p. 57 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Business Process Management Workshops
by Rosa, Marcello.
Publication:
. LVI, 783 p. 264 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
E-Business and Telecommunications
by Obaidat, Mohammad S.
Publication:
. XVI, 536 p. 226 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Understanding High-Dimensional Spaces
by Skillicorn, David B.
Publication:
. IX, 108 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Introduction to Cryptography with Maple
by Gómez Pardo, José Luis.
Publication:
. XXX, 705 p. 20 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Engineering Secure Two-Party Computation Protocols
by Schneider, Thomas.
Publication:
. XVI, 138 p. 35 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Fault Analysis in Cryptography
by Joye, Marc.
Publication:
. XVI, 354 p. 98 illus., 35 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Geometric Structure of High-Dimensional Data and Dimensionality Reduction
by Wang, Jianzhong.
Publication:
. Approx. 365 p. 91 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
e-Business and Telecommunications
by Obaidat, Mohammad S.
Publication:
. XVI, 448 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|