//]]>
Combinatorial Algorithms by Iliopoulos, Costas S. Publication: . XI, 418 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Engineering Secure Software and Systems by Erlingsson, Úlfar. Publication: . XI, 273p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Digital Watermarking by Kim, Hyoung-Joong. Publication: . X, 317p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
DNA Computing and Molecular Programming by Sakakibara, Yasubumi. Publication: . X, 187p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Implementation and Application of Automata by Domaratzki, Michael. Publication: . XII, 332p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information and Communications Security by Soriano, Miguel. Publication: . XIV, 474p. 120 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptology and Network Security by Heng, Swee-Huay. Publication: . XIII, 355p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms and Computation by Cheong, Otfried. Publication: . XVIII, 465p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms and Computation by Cheong, Otfried. Publication: . XVIII, 474p. 96 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Retrieval Technology by Cheng, Pu-Jen. Publication: . XIII, 627p. 152 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Graph Theoretic Concepts in Computer Science by Thilikos, Dimitrios M. Publication: . XIII, 338p. 62 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Large-Scale Data- and Knowledge-Centered Systems II by Hameurlain, Abdelkader. Publication: . XI, 141p. 65 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Objects and Databases by Dearle, Alan. Publication: . XIV, 161p. 58 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Graph Transformations by Ehrig, Hartmut. Publication: . XII, 419p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy in Statistical Databases by Domingo-Ferrer, Josep. Publication: . XI, 297p. 47 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms – ESA 2010 by Berg, Mark. Publication: . XVII, 245p. 28 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms – ESA 2010 by Berg, Mark. Publication: . XVIII, 587p. 68 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Database and XML Technologies by Lee, Mong Li. Publication: . VI, 156p. 59 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Recent Advances in Intrusion Detection by Jha, Somesh. Publication: . 524p. 160 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques by Serna, Maria. Publication: . XIII, 782p. 54 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية