//]]>
Cryptography and Coding by Stam, Martijn. Publication: . XII, 365 p. 39 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Computing by Afek, Yehuda. Publication: . XXIV, 586 p. 54 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cellular Automata and Discrete Complex Systems by Kari, Jarkko. Publication: . X, 187 p. 35 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory and Applications of Models of Computation by Chan, T-H. Hubert. Publication: . XV, 356 p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information and Communications Security by Chim, Tat Wing. Publication: . XVI, 506 p. 120 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptographic Hardware and Embedded Systems – CHES 2012 by Prouff, Emmanuel. Publication: . XVII, 562 p. 189 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Arithmetic of Finite Fields by Özbudak, Ferruh. Publication: . XII, 247p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in VLSI Design and Test by Rahaman, Hafizur. Publication: . XXIV, 408 p. 275 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory and Applications of Models of Computation by Agrawal, Manindra. Publication: . XV, 622 p. 91 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptography and Coding by Chen, Liqun. Publication: . XIII, 497 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information and Communications Security by Qing, Sihan. Publication: . XIII, 432p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptographic Hardware and Embedded Systems – CHES 2011 by Preneel, Bart. Publication: . XIV, 524 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Recent Advances in Intrusion Detection by Sommer, Robin. Publication: . 398p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information and Communications Security by Soriano, Miguel. Publication: . XIV, 474p. 120 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Recent Advances in Intrusion Detection by Jha, Somesh. Publication: . 524p. 160 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptographic Hardware and Embedded Systems, CHES 2010 by Mangard, Stefan. Publication: . XIII, 458p. 142 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Arithmetic of Finite Fields by Hasan, M. Anwar. Publication: . 280p. 41 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
e-Business and Telecommunications by Obaidat, Mohammad S. Publication: . XVI, 448 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multimedia Communications, Services and Security by Dziech, Andrzej. Publication: . XIV, 354 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The LLL Algorithm by Nguyen, Phong Q. Publication: . XIV, 496 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية