//]]>
Selected Areas in Cryptography by Miri, Ali. Publication: . XIII, 431 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptography and Security: From Theory to Applications by Naccache, David. Publication: . XIII, 502 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Reconfigurable Computing: Architectures, Tools and Applications by Choy, Oliver C. S. Publication: . XIV, 386p. 24 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Building a National Distributed e-Infrastructure–PL-Grid by Bubak, Marian. Publication: . XII, 354 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms for Sensor Systems by Erlebach, Thomas. Publication: . X, 239p. 36 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Wireless Sensor Networks by Picco, Gian Pietro. Publication: . XII, 261p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Parallel and Scientific Computing by Jónasson, Kristján. Publication: . XXVII, 339p. 155 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Parallel and Scientific Computing by Jónasson, Kristján. Publication: . XXVIII, 477p. 170 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Topics in Cryptology – CT-RSA 2012 by Dunkelman, Orr. Publication: . XI, 434p. 85 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Foundations and Practice of Security by Garcia-Alfaro, Joaquin. Publication: . XIII, 253 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Applications by Jung, Souhwan. Publication: . XII, 271p. 74 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
SOFSEM 2012: Theory and Practice of Computer Science by Bieliková, Mária. Publication: . XVII, 674 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Danezis, George. Publication: . Approx. 335 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Security and Applications by Mödersheim, Sebastian. Publication: . IX, 225 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Smart Card Research and Advanced Applications by Prouff, Emmanuel. Publication: . XI, 337 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Swarm, Evolutionary, and Memetic Computing by Panigrahi, Bijaya Ketan. Publication: . XXII, 332p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Swarm, Evolutionary, and Memetic Computing by Panigrahi, Bijaya Ketan. Publication: . XXII, 754 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Computing and Networking by Bononi, Luciano. Publication: . XIV, 550p. 196 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mathematical and Engineering Methods in Computer Science by Kotásek, Zdeněk. Publication: . XII, 215p. 53 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Principles of Distributed Systems by Fernàndez Anta, Antonio. Publication: . XIII, 564 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية