//]]>
Data Analytics by Runkler, Thomas A. Publication: . X, 137 p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Engineering and Technology by Xu, Weixia. Publication: . XIV, 252 p. 151 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Physically Unclonable Functions by Maes, Roel. Publication: . XVII, 193 p. 28 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Modern Cryptography Primer by Kościelny, Czesław. Publication: . XIV, 238 p. 97 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Introduction to Public Key Infrastructures by Buchmann, Johannes A. Publication: . XV, 194 p. 146 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Bluetooth Security Attacks by Haataja, Keijo. Publication: . VII, 93 p. 31 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Economics of Information Security and Privacy by Böhme, Rainer. Publication: . XIII, 321 p. 57 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Business Process Management Workshops by Rosa, Marcello. Publication: . LVI, 783 p. 264 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Engineering and Technology by Xu, Weixia. Publication: . XIV, 263 p. 164 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
E-Business and Telecommunications by Obaidat, Mohammad S. Publication: . XVI, 536 p. 226 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Real-Time C++ by Kormanyos, Christopher Michael. Publication: . XXIII, 357 p. 20 illus., 3 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Reflections on the History of Computing by Tatnall, Arthur. Publication: . X, 397 p. 58 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Understanding High-Dimensional Spaces by Skillicorn, David B. Publication: . IX, 108 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Introduction to Cryptography with Maple by Gómez Pardo, José Luis. Publication: . XXX, 705 p. 20 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Engineering Secure Two-Party Computation Protocols by Schneider, Thomas. Publication: . XVI, 138 p. 35 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fault Analysis in Cryptography by Joye, Marc. Publication: . XVI, 354 p. 98 illus., 35 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Software and Data Technologies by Cordeiro, José. Publication: . XII, 269 p. 99 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
VLSI-SoC: Forward-Looking Trends in IC and Systems Design by Ayala, José L. Publication: . X, 355p. 239 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Linked Data in Linguistics by Chiarcos, Christian. Publication: . XIV, 216p. 34 illus., 5 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Geometric Structure of High-Dimensional Data and Dimensionality Reduction by Wang, Jianzhong. Publication: . Approx. 365 p. 91 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية