//]]>
Privacy Enhancing Technologies by Atallah, Mikhail J. Publication: . X, 291p. 51 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithmic Number Theory by Hanrot, Guillaume. Publication: . XI, 397p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Theoretic Security by Kurosawa, Kaoru. Publication: . X, 249p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Developments in Language Theory by Gao, Yuan. Publication: . XII, 446p. 48 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information, Security and Cryptology – ICISC 2009 by Lee, Donghoon. Publication: . XIII, 387p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Self-Organizing Architectures by Weyns, Danny. Publication: . X, 301p. 110 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Parallel Processing and Applied Mathematics by Wyrzykowski, Roman. Publication: . XXIV, 596p. 272 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Parallel Processing and Applied Mathematics by Wyrzykowski, Roman. Publication: . XXIV, 628p. 242 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithmic Aspects in Information and Management by Chen, Bo. Publication: . XI, 336p. 51 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Mathematics of Language by Ebert, Christian. Publication: . VIII, 297p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Data Hiding and Multimedia Security V by Shi, Yun Q. Publication: . XI, 129p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Current Topics in Artificial Intelligence by Meseguer, Pedro. Publication: . XII, 302p. 77 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Detection of Intrusions and Malware, and Vulnerability Assessment by Kreibich, Christian. Publication: . XII, 219p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automated Reasoning by Giesl, Jürgen. Publication: . XII, 534p. 85 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory and Applications of Satisfiability Testing – SAT 2010 by Strichman, Ofer. Publication: . XIII, 400p. 74 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Deontic Logic in Computer Science by Governatori, Guido. Publication: . VIII, 323p. 33 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automata, Languages and Programming by Abramsky, Samson. Publication: . XXIII, 754p. 42 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Automata, Languages and Programming by Abramsky, Samson. Publication: . XXIV, 614p. 78 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Artifical Evolution by Collet, Pierre. Publication: . XII, 207p. 75 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Euro-Par 2009 – Parallel Processing Workshops by Lin, Hai-Xiang. Publication: . XIX, 468p. 137 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart