//]]>
Multiple Access Communications by Bellalta, Boris. Publication: . XII, 183 p. 67 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – ASIACRYPT 2012 by Wang, Xiaoyun. Publication: . XVI, 780 p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology - INDOCRYPT 2012 by Galbraith, Steven. Publication: . XIV, 566 p. 118 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Internet and Distributed Computing Systems by Xiang, Yang. Publication: . XIV, 289 p. 182 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multi-Agent Systems by Cossentino, Massimo. Publication: . XII, 259 p. 82 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology by Wu, Chuan-Kun. Publication: . X, 394 p. 56 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Data and Knowledge Engineering by Xiang, Yang. Publication: . XII, 251 p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security, Privacy, and Applied Cryptography Engineering by Bogdanov, Andrey. Publication: . XII, 173 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Computer Entertainment by Nijholt, Anton. Publication: . XXIV, 599 p. 337 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Decision and Game Theory for Security by Grossklags, Jens. Publication: . XII, 309 p. 48 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Visual Media by Hu, Shi-Min. Publication: . XII, 268 p. 116 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Structural, Syntactic, and Statistical Pattern Recognition by Gimel’farb, Georgy. Publication: . XVIII, 755 p. 236 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Intelligent Data Analysis XI by Hollmén, Jaakko. Publication: . XIV, 426 p. 136 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Information and Computer Security by Hanaoka, Goichiro. Publication: . XII, 261 p. 33 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Computing and Applications by Liu, Baoxiang. Publication: . XX, 782 p. 262 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fast Software Encryption by Canteaut, Anne. Publication: . XII, 463 p. 82 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Vision – ECCV 2012. Workshops and Demonstrations by Fusiello, Andrea. Publication: . XXIV, 684 p. 325 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Vision – ECCV 2012. Workshops and Demonstrations by Fusiello, Andrea. Publication: . XXII, 611 p. 323 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computer Vision – ECCV 2012. Workshops and Demonstrations by Fusiello, Andrea. Publication: . XXII, 611 p. 276 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory and Practice of Natural Computing by Dediu, Adrian-Horia. Publication: . X, 227 p. 76 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية