//]]>
Genetic Programming by Moraglio, Alberto. Publication: . XII, 279p. 91 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Approximation and Online Algorithms by Solis-Oba, Roberto. Publication: . X, 278 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – EUROCRYPT 2012 by Pointcheval, David. Publication: . XIV, 758 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Hybrid Artificial Intelligent Systems by Corchado, Emilio. Publication: . XXXII, 708 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Hybrid Artificial Intelligent Systems by Corchado, Emilio. Publication: . XXXII, 606 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Infrastructure Protection by Lopez, Javier. Publication: . XIV, 357 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Principles of Security and Trust by Degano, Pierpaolo. Publication: . XIV, 431 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Passive and Active Measurement by Taft, Nina. Publication: . XI, 264 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Selected Areas in Cryptography by Miri, Ali. Publication: . XIII, 431 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligent Information and Database Systems by Pan, Jeng-Shyang. Publication: . XIX, 529 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligent Information and Database Systems by Pan, Jeng-Shyang. Publication: . XX, 575p. 230 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligent Information and Database Systems by Pan, Jeng-Shyang. Publication: . XXXI, 503p. 214 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptography and Security: From Theory to Applications by Naccache, David. Publication: . XIII, 502 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Building a National Distributed e-Infrastructure–PL-Grid by Bubak, Marian. Publication: . XII, 354 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Partially Supervised Learning by Schwenker, Friedhelm. Publication: . X, 159 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Wireless Sensor Networks by Picco, Gian Pietro. Publication: . XII, 261p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Foundations and Practice of Security by Garcia-Alfaro, Joaquin. Publication: . XIII, 253 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Applications by Jung, Souhwan. Publication: . XII, 271p. 74 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Danezis, George. Publication: . Approx. 335 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Smart Card Research and Advanced Applications by Prouff, Emmanuel. Publication: . XI, 337 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية