//]]>
Number Theory and Cryptography by Fischlin, Marc. Publication: . XII, 281 p. 69 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications by Ruiz-Shulcloper, José. Publication: . XXXII, 573 p. 219 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications by Ruiz-Shulcloper, José. Publication: . XXXII, 563 p. 170 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithmic Decision Theory by Perny, Patrice. Publication: . XII, 442 p. 96 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Evolution of Telecommunication Services by Bertin, Emmanuel. Publication: . XII, 327 p. 105 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Computing by Afek, Yehuda. Publication: . XXIV, 586 p. 54 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Numerical Analysis and Its Applications by Dimov, Ivan. Publication: . XII, 572 p. 135 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Secure IT Systems by Riis Nielson, Hanne. Publication: . XIV, 321 p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Internet and Distributed Computing Systems by Pathan, Mukaddim. Publication: . XI, 400 p. 179 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Intelligent Data Analysis XII by Tucker, Allan. Publication: . XIV, 464 p. 140 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Information and Computer Security by Sakiyama, Kazuo. Publication: . XII, 319 p. 53 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Intelligent Data Engineering and Automated Learning – IDEAL 2013 by Yin, Hujun. Publication: . XVIII, 639 p. 215 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Formal Methods and Software Engineering by Groves, Lindsay. Publication: . XVIII, 466 p. 136 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Image Analysis and Processing – ICIAP 2013 by Petrosino, Alfredo. Publication: . XXVII, 764 p. 342 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Image Analysis and Processing – ICIAP 2013 by Petrosino, Alfredo. Publication: . XXVII, 858 p. 385 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthy Global Computing by Palamidessi, Catuscia. Publication: . X, 213 p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security and Trust Management by Accorsi, Rafael. Publication: . X, 235 p. 53 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Similarity Search and Applications by Brisaboa, Nieves. Publication: . XII, 332 p. 128 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Reachability Problems by Abdulla, Parosh Aziz. Publication: . XII, 223 p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computational Logistics by Pacino, Dario. Publication: . X, 269 p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 4 5 6 7 8 9 10 Next >>

Languages: 
English |
العربية