//]]>
Advances in Cryptology – CRYPTO 2011 by Rogaway, Phillip. Publication: . XV, 782p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computing and Combinatorics by Fu, Bin. Publication: . XIII, 650p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation by Goldreich, Oded. Publication: . XI, 563p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Infrastructures, Services and Applications by Camenisch, Jan. Publication: . XII, 209 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Combinatorial Optimization and Applications by Wang, Weifan. Publication: . XII, 562 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Modeling Decision for Artificial Intelligence by Torra, Vicenç. Publication: . XIII, 259 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Rule-Based Reasoning, Programming, and Applications by Bassiliades, Nick. Publication: . XIII, 385 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Parampalli, Udaya. Publication: . XIII, 464 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Detection of Intrusions and Malware, and Vulnerability Assessment by Holz, Thorsten. Publication: . X, 235p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Artificial Immune Systems by Liò, Pietro. Publication: . XVI, 468p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
User Modeling, Adaption and Personalization by Konstan, Joseph A. Publication: . XIX, 464 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Scientific and Statistical Database Management by Bayard Cushing, Judith. Publication: . XVII, 602p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data and Applications Security and Privacy XXV by Li, Yingjiu. Publication: . XI, 309p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Developments in Language Theory by Mauri, Giancarlo. Publication: . XIV, 482 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms and Data Structures by Dehne, Frank. Publication: . XV, 718p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy Enhancing Technologies by Fischer-Hübner, Simone. Publication: . X, 285 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Implementation and Application of Automata by Bouchou-Markhoff, Béatrice. Publication: . XIII, 299p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Structural Information and Communication Complexity by Kosowski, Adrian. Publication: . XI, 317p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automata, Languages and Programming by Aceto, Luca. Publication: . XXVI, 666 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automata, Languages and Programming by Aceto, Luca. Publication: . XXIV, 802p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية