//]]>
Privacy Enhancing Technologies by Atallah, Mikhail J. Publication: . X, 291p. 51 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithmic Number Theory by Hanrot, Guillaume. Publication: . XI, 397p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Theoretic Security by Kurosawa, Kaoru. Publication: . X, 249p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Developments in Language Theory by Gao, Yuan. Publication: . XII, 446p. 48 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information, Security and Cryptology – ICISC 2009 by Lee, Donghoon. Publication: . XIII, 387p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Self-Organizing Architectures by Weyns, Danny. Publication: . X, 301p. 110 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Parallel Processing and Applied Mathematics by Wyrzykowski, Roman. Publication: . XXIV, 596p. 272 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Parallel Processing and Applied Mathematics by Wyrzykowski, Roman. Publication: . XXIV, 628p. 242 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithmic Aspects in Information and Management by Chen, Bo. Publication: . XI, 336p. 51 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Data Hiding and Multimedia Security V by Shi, Yun Q. Publication: . XI, 129p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Current Topics in Artificial Intelligence by Meseguer, Pedro. Publication: . XII, 302p. 77 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Detection of Intrusions and Malware, and Vulnerability Assessment by Kreibich, Christian. Publication: . XII, 219p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory and Applications of Satisfiability Testing – SAT 2010 by Strichman, Ofer. Publication: . XIII, 400p. 74 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automata, Languages and Programming by Abramsky, Samson. Publication: . XXIII, 754p. 42 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automata, Languages and Programming by Abramsky, Samson. Publication: . XXIV, 614p. 78 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Artifical Evolution by Collet, Pierre. Publication: . XII, 207p. 75 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Euro-Par 2009 – Parallel Processing Workshops by Lin, Hai-Xiang. Publication: . XIX, 468p. 137 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Steinfeld, Ron. Publication: . XII, 403p. 40 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computing and Combinatorics by Thai, My T. Publication: . 553p. 103 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mechanisms for Autonomous Management of Networks and Services by Stiller, Burkhard. Publication: . XIII, 179p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart