|
|
Cryptography and Coding
by Stam, Martijn.
Publication:
. XII, 365 p. 39 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Computing
by Afek, Yehuda.
Publication:
. XXIV, 586 p. 54 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cellular Automata and Discrete Complex Systems
by Kari, Jarkko.
Publication:
. X, 187 p. 35 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory and Applications of Models of Computation
by Chan, T-H. Hubert.
Publication:
. XV, 356 p. 37 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information and Communications Security
by Chim, Tat Wing.
Publication:
. XVI, 506 p. 120 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptographic Hardware and Embedded Systems – CHES 2012
by Prouff, Emmanuel.
Publication:
. XVII, 562 p. 189 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Arithmetic of Finite Fields
by Özbudak, Ferruh.
Publication:
. XII, 247p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in VLSI Design and Test
by Rahaman, Hafizur.
Publication:
. XXIV, 408 p. 275 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory and Applications of Models of Computation
by Agrawal, Manindra.
Publication:
. XV, 622 p. 91 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptography and Coding
by Chen, Liqun.
Publication:
. XIII, 497 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information and Communications Security
by Qing, Sihan.
Publication:
. XIII, 432p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptographic Hardware and Embedded Systems – CHES 2011
by Preneel, Bart.
Publication:
. XIV, 524 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Recent Advances in Intrusion Detection
by Sommer, Robin.
Publication:
. 398p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information and Communications Security
by Soriano, Miguel.
Publication:
. XIV, 474p. 120 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Recent Advances in Intrusion Detection
by Jha, Somesh.
Publication:
. 524p. 160 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptographic Hardware and Embedded Systems, CHES 2010
by Mangard, Stefan.
Publication:
. XIII, 458p. 142 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Arithmetic of Finite Fields
by Hasan, M. Anwar.
Publication:
. 280p. 41 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
e-Business and Telecommunications
by Obaidat, Mohammad S.
Publication:
. XVI, 448 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Multimedia Communications, Services and Security
by Dziech, Andrzej.
Publication:
. XIV, 354 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The LLL Algorithm
by Nguyen, Phong Q.
Publication:
. XIV, 496 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|