//]]>
Combinatorial Algorithms by Iliopoulos, Costas S. Publication: . XI, 418 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Digital Watermarking by Kim, Hyoung-Joong. Publication: . X, 317p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Quantum Computation, Communication, and Cryptography by Dam, Wim. Publication: . VIII, 187 p. 14 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Computational Science XI by Gavrilova, Marina L. Publication: . XVIII, 294p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information and Communications Security by Soriano, Miguel. Publication: . XIV, 474p. 120 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptology and Network Security by Heng, Swee-Huay. Publication: . XIII, 355p. 66 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Pairing-Based Cryptography - Pairing 2010 by Joye, Marc. Publication: . XIII, 467p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Provable Security by Heng, Swee-Huay. Publication: . X, 279p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Sequences and Their Applications – SETA 2010 by Carlet, Claude. Publication: . X, 465p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthly Global Computing by Wirsing, Martin. Publication: . XII, 380p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptographic Hardware and Embedded Systems, CHES 2010 by Mangard, Stefan. Publication: . XIII, 458p. 142 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Cryptography by Micciancio, Daniele. Publication: . 607p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptology and Network Security by Abdalla, Michel. Publication: . XVIII, 349 p. 52 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Procedural Semantics for Hyperintensional Logic by Duží, Marie. Publication: . XIII, 550p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Selected Unsolved Problems in Coding Theory by Joyner, David. Publication: . XII, 248p. 17 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Towards an Information Theory of Complex Networks by Dehmer, Matthias. Publication: . XVI, 395p. 114 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Game Start! by Alinovi, Francesco. Publication: . VII, 296 pagg. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Thinkquest~2010 by Pise, S. J. Publication: . IX, 327p. 120 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Flow Based Security Control Beyond RBAC by Fischer-Hellmann, Klaus-Peter. Publication: . XXI, 161 p. 25 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Evolution of Semantic Systems by Küppers, Bernd-Olaf. Publication: . XII, 232 p. 48 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية