//]]>
Web-Age Information Management by Bao, Zhifeng. Publication: . XXX, 362 p. 177 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptographic Hardware and Embedded Systems – CHES 2012 by Prouff, Emmanuel. Publication: . XVII, 562 p. 189 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Algebra in Scientific Computing by Gerdt, Vladimir P. Publication: . XIV, 363 p. 42 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mathematical Foundations of Computer Science 2012 by Rovan, Branislav. Publication: . XV, 825 p. 102 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
DNA Computing and Molecular Programming by Stefanovic, Darko. Publication: . X, 151 p. 51 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Digital Forensics and Watermarking by Shi, Yun Qing. Publication: . X, 512 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Generic and Indexed Programming by Gibbons, Jeremy. Publication: . VII, 259 p. 24 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Similarity Search and Applications by Navarro, Gonzalo. Publication: . X, 247 p. 90 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trends in Functional Programming by Peña, Ricardo. Publication: . X, 195 p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Arithmetic of Finite Fields by Özbudak, Ferruh. Publication: . XII, 247p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Implementation and Application of Automata by Moreira, Nelma. Publication: . XIII, 369 p. 76 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in VLSI Design and Test by Rahaman, Hafizur. Publication: . XXIV, 408 p. 275 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology - AFRICACRYPT 2012 by Mitrokotsa, Aikaterini. Publication: . XI, 424p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Cryptography and Network Security by Bao, Feng. Publication: . XIV, 580p. 107 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Combinatorial Pattern Matching by Kärkkäinen, Juha. Publication: . XIII, 454p. 82 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Scientific and Statistical Database Management by Ailamaki, Anastasia. Publication: . XVII, 654p. 318 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithm Theory – SWAT 2012 by Fomin, Fedor V. Publication: . XIII, 410p. 62 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Application and Theory of Petri Nets by Haddad, Serge. Publication: . XI, 419p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Structural Information and Communication Complexity by Even, Guy. Publication: . XIII, 340 p. 54 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems by Askoxylakis, Ioannis. Publication: . XII, 225p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية