|
|
Principles of Compilers
by Su, Yunlin.
Publication:
. 500p. 100 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
e-Business and Telecommunications
by Obaidat, Mohammad S.
Publication:
. XVII, 359p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Critical Infrastructure Protection IV
by Moore, Tyler.
Publication:
. XVIII, 260p. 86 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Three-Dimensional Model Analysis and Processing
by Yu, Faxin.
Publication:
. 500p. 160 illus., 40 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
VLSI-SoC: Design Methodologies for SoC and SiP
by Piguet, Christian.
Publication:
. VIII, 287p. 182 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security in Emerging Wireless Communication and Networking Systems
by Gu, Qijun.
Publication:
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Codes and Turbo Codes
by Berrou, Claude.
Publication:
. 400p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Handbook of Data Compression
by Salomon, David.
Publication:
. XXII, 1361p. 510 illus., 6 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Security for Wireless Implantable Medical Devices
by Hei, Xiali.
Publication:
. XI, 45 p. 13 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Mathematics in Computing
by O’Regan, Gerard.
Publication:
. XIX, 285 p. 131 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Multiple Description Coding
by Bai, Huihui.
Publication:
. X, 174 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Identity-Based Encryption
by Chatterjee, Sanjit.
Publication:
. XI, 182p. 19 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Encyclopedia of Cryptography and Security
by van Tilborg, Henk C. A.
Publication:
. XL, 1435p. eReference. In 2 volumes, not available separately.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Encryption for Digital Content
by Kiayias, Aggelos.
Publication:
. XIII, 209 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network Security
by Huang, Scott C.-H.
Publication:
. XXIII, 300p. 116 illus., 58 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Signatures
by Katz, Jonathan.
Publication:
. XIV, 183p. 8 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|