|
|
Genetic Programming
by Moraglio, Alberto.
Publication:
. XII, 279p. 91 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Approximation and Online Algorithms
by Solis-Oba, Roberto.
Publication:
. X, 278 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Advances in Cryptology – EUROCRYPT 2012
by Pointcheval, David.
Publication:
. XIV, 758 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Hybrid Artificial Intelligent Systems
by Corchado, Emilio.
Publication:
. XXXII, 708 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Hybrid Artificial Intelligent Systems
by Corchado, Emilio.
Publication:
. XXXII, 606 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Infrastructure Protection
by Lopez, Javier.
Publication:
. XIV, 357 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Principles of Security and Trust
by Degano, Pierpaolo.
Publication:
. XIV, 431 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Passive and Active Measurement
by Taft, Nina.
Publication:
. XI, 264 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Selected Areas in Cryptography
by Miri, Ali.
Publication:
. XIII, 431 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligent Information and Database Systems
by Pan, Jeng-Shyang.
Publication:
. XIX, 529 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligent Information and Database Systems
by Pan, Jeng-Shyang.
Publication:
. XX, 575p. 230 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Intelligent Information and Database Systems
by Pan, Jeng-Shyang.
Publication:
. XXXI, 503p. 214 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Cryptography and Security: From Theory to Applications
by Naccache, David.
Publication:
. XIII, 502 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Building a National Distributed e-Infrastructure–PL-Grid
by Bubak, Marian.
Publication:
. XII, 354 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Partially Supervised Learning
by Schwenker, Friedhelm.
Publication:
. X, 159 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Wireless Sensor Networks
by Picco, Gian Pietro.
Publication:
. XII, 261p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Foundations and Practice of Security
by Garcia-Alfaro, Joaquin.
Publication:
. XIII, 253 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Applications
by Jung, Souhwan.
Publication:
. XII, 271p. 74 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Financial Cryptography and Data Security
by Danezis, George.
Publication:
. Approx. 335 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Smart Card Research and Advanced Applications
by Prouff, Emmanuel.
Publication:
. XI, 337 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|