//]]>
Sequences and Their Applications – SETA 2010 by Carlet, Claude. Publication: . X, 465p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthly Global Computing by Wirsing, Martin. Publication: . XII, 380p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptographic Hardware and Embedded Systems, CHES 2010 by Mangard, Stefan. Publication: . XIII, 458p. 142 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Cryptography by Micciancio, Daniele. Publication: . 607p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptology and Network Security by Abdalla, Michel. Publication: . XVIII, 349 p. 52 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Procedural Semantics for Hyperintensional Logic by Duží, Marie. Publication: . XIII, 550p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Selected Unsolved Problems in Coding Theory by Joyner, David. Publication: . XII, 248p. 17 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Towards an Information Theory of Complex Networks by Dehmer, Matthias. Publication: . XVI, 395p. 114 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Game Start! by Alinovi, Francesco. Publication: . VII, 296 pagg. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Thinkquest~2010 by Pise, S. J. Publication: . IX, 327p. 120 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Flow Based Security Control Beyond RBAC by Fischer-Hellmann, Klaus-Peter. Publication: . XXI, 161 p. 25 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Evolution of Semantic Systems by Küppers, Bernd-Olaf. Publication: . XII, 232 p. 48 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Recent Trends in Computer Networks and Distributed Systems Security by Thampi, Sabu M. Publication: . XXI, 508 p. 207 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
VLSI-SoC: Forward-Looking Trends in IC and Systems Design by Ayala, José L. Publication: . X, 355p. 239 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
e-Business and Telecommunications by Obaidat, Mohammad S. Publication: . XVI, 448 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Assurance by Kim, Tai-hoon. Publication: . XIV, 406p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
VLSI-SoC: Technologies for Systems Integration by Becker, Jürgen. Publication: . X, 202 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Principles of Compilers by Su, Yunlin. Publication: . 500p. 100 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
e-Business and Telecommunications by Obaidat, Mohammad S. Publication: . XVII, 359p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Infrastructure Protection IV by Moore, Tyler. Publication: . XVIII, 260p. 86 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية