//]]>
Financial Cryptography and Data Security by Danezis, George. Publication: . Approx. 335 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Security and Applications by Mödersheim, Sebastian. Publication: . IX, 225 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Smart Card Research and Advanced Applications by Prouff, Emmanuel. Publication: . XI, 337 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Swarm, Evolutionary, and Memetic Computing by Panigrahi, Bijaya Ketan. Publication: . XXII, 332p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Swarm, Evolutionary, and Memetic Computing by Panigrahi, Bijaya Ketan. Publication: . XXII, 754 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Computing and Networking by Bononi, Luciano. Publication: . XIV, 550p. 196 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mathematical and Engineering Methods in Computer Science by Kotásek, Zdeněk. Publication: . XII, 215p. 53 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Anaphora Processing and Applications by Hendrickx, Iris. Publication: . X, 199 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Graph Drawing by Kreveld, Marc. Publication: . XIV, 458 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Principles of Distributed Systems by Fernàndez Anta, Antonio. Publication: . XIII, 564 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Graph-Theoretic Concepts in Computer Science by Kolman, Petr. Publication: . XI, 344 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols XIX by Christianson, Bruce. Publication: . IX, 383 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Data Mining and Applications by Tang, Jie. Publication: . XVII, 419 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced Data Mining and Applications by Tang, Jie. Publication: . XVIII, 426 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
AI 2011: Advances in Artificial Intelligence by Wang, Dianhui. Publication: . XVII, 821 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multi-disciplinary Trends in Artificial Intelligence by Sombattheera, Chattrakul. Publication: . 444p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Retrieval Technology by Salem, Mohamed Vall Mohamed. Publication: . XV, 626 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms and Computation by Asano, Takao. Publication: . XVIII, 775 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – INDOCRYPT 2011 by Bernstein, Daniel J. Publication: . XIII, 401 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Performance Evaluation of Computer and Communication Systems. Milestones and Future Challenges by Hummel, Karin Anna. Publication: . XII, 255 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart