//]]>
Graph-Theoretic Concepts in Computer Science by Kolman, Petr. Publication: . XI, 344 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security Protocols XIX by Christianson, Bruce. Publication: . IX, 383 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Middleware 2011 by Kon, Fabio. Publication: . XIII, 514 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multi-disciplinary Trends in Artificial Intelligence by Sombattheera, Chattrakul. Publication: . 444p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data Security and Security Data by MacKinnon, Lachlan M. Publication: . X, 155 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
New Frontiers in Artificial Intelligence by Onada, Takashi. Publication: . X, 342 p. 122 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms and Computation by Asano, Takao. Publication: . XVIII, 775 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – INDOCRYPT 2011 by Bernstein, Daniel J. Publication: . XIII, 401 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Performance Evaluation of Computer and Communication Systems. Milestones and Future Challenges by Hummel, Karin Anna. Publication: . XII, 255 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Learning and Intelligent Optimization by Coello, Carlos A. Coello. Publication: . XVII, 636 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Systems Security by Jajodia, Sushil. Publication: . XV, 388 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Service-Oriented Computing by Kappel, Gerti. Publication: . XVIII, 680 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptology and Network Security by Lin, Dongdai. Publication: . XII, 313 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Internet and Network Economics by Chen, Ning. Publication: . XII, 420 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligent Robotics and Applications by Jeschke, Sabina. Publication: . XXIV, 623 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligent Robotics and Applications by Jeschke, Sabina. Publication: . XXIV, 643 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Post-Quantum Cryptography by Yang, Bo-Yin. Publication: Berlin, Heidelberg : Springer Berlin Heidelberg, 2011 Date:2011 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Image and Video Technology by Ho, Yo-Sung. Publication: . XVII, 423 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Quality in e-Health by Holzinger, Andreas. Publication: . XVI, 716p. 219 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Image and Video Technology by Ho, Yo-Sung. Publication: . XVII, 407 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart