|
|
Applied Cryptography and Network Security
by Bao, Feng.
Publication:
. XIV, 580p. 107 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Combinatorial Pattern Matching
by Kärkkäinen, Juha.
Publication:
. XIII, 454p. 82 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Scientific and Statistical Database Management
by Ailamaki, Anastasia.
Publication:
. XVII, 654p. 318 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithm Theory – SWAT 2012
by Fomin, Fedor V.
Publication:
. XIII, 410p. 62 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Application and Theory of Petri Nets
by Haddad, Serge.
Publication:
. XI, 419p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Structural Information and Communication Complexity
by Even, Guy.
Publication:
. XIII, 340 p. 54 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems
by Askoxylakis, Ioannis.
Publication:
. XII, 225p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Fun with Algorithms
by Kranakis, Evangelos.
Publication:
. XI, 397p. 148 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory and Applications of Models of Computation
by Agrawal, Manindra.
Publication:
. XV, 622 p. 91 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Semantic Web
by Pan, Jeff Z.
Publication:
. XIII, 436p. 119 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Frontiers in Algorithmics and Algorithmic Aspects in Information and Management
by Snoeyink, Jack.
Publication:
. XVII, 370 p. 77 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Research in Computational Molecular Biology
by Chor, Benny.
Publication:
. XVI, 372p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Technology for Applications
by Laud, Peeter.
Publication:
. X, 273 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics
by Giacobini, Mario.
Publication:
. XIII, 255p. 76 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Engineering Secure Software and Systems
by Barthe, Gilles.
Publication:
. XII, 151p. 37 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Transactions on Large-Scale Data- and Knowledge-Centered Systems V
by Hameurlain, Abdelkader.
Publication:
. IX, 223 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security Technology for Applications
by Aura, Tuomas.
Publication:
. X, 289 p. 73 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Graph-Theoretic Concepts in Computer Science
by Kolman, Petr.
Publication:
. XI, 344 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Data Security and Security Data
by MacKinnon, Lachlan M.
Publication:
. X, 155 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Retrieval Technology
by Salem, Mohamed Vall Mohamed.
Publication:
. XV, 626 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|