//]]>
Public Key Cryptography – PKC 2012 by Fischlin, Marc. Publication: . XIV, 734 p. 63 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
NETWORKING 2012 by Bestak, Robert. Publication: . XXI, 421 p. 182 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
NETWORKING 2012 by Bestak, Robert. Publication: . XXII, 437 p. 191 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
NETWORKING 2012 Workshops by Becvar, Zdenek. Publication: . XVI, 158p. 57 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Constructive Side-Channel Analysis and Secure Design by Schindler, Werner. Publication: . Approx. 280 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Infrastructures, Services and Applications by Petkova-Nikova, Svetla. Publication: . X, 209 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Euro-Par 2011: Parallel Processing Workshops by Alexander, Michael. Publication: . XXX, 480 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Euro-Par 2011: Parallel Processing Workshops by Alexander, Michael. Publication: . XXIX, 524p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Reversible Computation by Vos, Alexis. Publication: . IX, 123p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
LATIN 2012: Theoretical Informatics by Fernández-Baca, David. Publication: . XVII, 669 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Computing, Networking and Security by Thilagam, P. Santhi. Publication: . XVII, 641 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Petri Nets and Other Models of Concurrency V by Jensen, Kurt. Publication: . XVII, 293 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – EUROCRYPT 2012 by Pointcheval, David. Publication: . XIV, 758 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Cryptography by Cramer, Ronald. Publication: . Approx. 670 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Data Hiding and Multimedia Security VII by Shi, Yun Q. Publication: . IX, 115p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Compiler Construction by O’Boyle, Michael. Publication: . XVI, 245 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Principles of Security and Trust by Degano, Pierpaolo. Publication: . XIV, 431 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Passive and Active Measurement by Taft, Nina. Publication: . XI, 264 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Computational Science XV by Gavrilova, Marina L. Publication: . XIII, 217 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Adaptive and Learning Agents by Vrancx, Peter. Publication: . VII, 135 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية