//]]>
Principles of Spread-Spectrum Communication Systems by Torrieri, Don. Publication: . XV, 577p. 214 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Entropy and Information Theory by Gray, Robert M. Publication: . XXVII, 409p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cooperative Communications and Networking by Hong, Y.-W. Peter. Publication: . XIX, 402p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Classical, Semi-classical and Quantum Noise by Cohen, Leon. Publication: . X, 298 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
MIMO Communication for Cellular Networks by Huang, Howard. Publication: . XVI, 316 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptography and Coding by Stam, Martijn. Publication: . XII, 365 p. 39 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Trustworthy Global Computing by Palamidessi, Catuscia. Publication: . X, 213 p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Digital Forensics and Watermaking by Shi, Yun Q. Publication: . XX, 532 p. 245 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Boyd, Colin. Publication: . XII, 437 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Cryptography and Network Security by Jacobson, Michael. Publication: . XIV, 572 p. 115 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – AFRICACRYPT 2013 by Youssef, Amr. Publication: . XIV, 453 p. 33 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology by Kutyłowski, Mirosław. Publication: . XII, 393 p. 61 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Theory, Combinatorics, and Search Theory by Aydinian, Harout. Publication: . XL, 773 p. 58 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public-Key Cryptography – PKC 2013 by Kurosawa, Kaoru. Publication: . XIV, 518 p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Pairing-Based Cryptography – Pairing 2012 by Abdalla, Michel. Publication: . XVI, 333 p. 18 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Topics in Cryptology – CT-RSA 2013 by Dawson, Ed. Publication: . XIV, 405 p. 68 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Quantum Computation, Communication, and Cryptography by Iwama, Kazuo. Publication: . VIII, 153 p. 7 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptology and Network Security by Pieprzyk, Josef. Publication: . XVI, 311 p. 48 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology by Wu, Chuan-Kun. Publication: . X, 394 p. 56 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Secure IT Systems by Jøsang, Audun. Publication: . X, 247 p. 62 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 4 5 6 Next >>

Languages: 
English |
العربية