//]]>
Fun with Algorithms by Kranakis, Evangelos. Publication: . XI, 397p. 148 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public Key Cryptography – PKC 2012 by Fischlin, Marc. Publication: . XIV, 734 p. 63 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
LATIN 2012: Theoretical Informatics by Fernández-Baca, David. Publication: . XVII, 669 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Cryptology – EUROCRYPT 2012 by Pointcheval, David. Publication: . XIV, 758 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Computational Science XV by Gavrilova, Marina L. Publication: . XIII, 217 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptography and Security: From Theory to Applications by Naccache, David. Publication: . XIII, 502 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Parallel and Scientific Computing by Jónasson, Kristján. Publication: . XXVII, 339p. 155 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Parallel and Scientific Computing by Jónasson, Kristján. Publication: . XXVIII, 477p. 170 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Topics in Cryptology – CT-RSA 2012 by Dunkelman, Orr. Publication: . XI, 434p. 85 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
SOFSEM 2012: Theory and Practice of Computer Science by Bieliková, Mária. Publication: . XVII, 674 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Principles of Distributed Systems by Fernàndez Anta, Antonio. Publication: . XIII, 564 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Graph-Theoretic Concepts in Computer Science by Kolman, Petr. Publication: . XI, 344 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms and Computation by Asano, Takao. Publication: . XVIII, 775 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – INDOCRYPT 2011 by Bernstein, Daniel J. Publication: . XIII, 401 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Learning and Intelligent Optimization by Coello, Carlos A. Coello. Publication: . XVII, 636 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptology and Network Security by Lin, Dongdai. Publication: . XII, 313 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Internet and Network Economics by Chen, Ning. Publication: . XII, 420 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Post-Quantum Cryptography by Yang, Bo-Yin. Publication: Berlin, Heidelberg : Springer Berlin Heidelberg, 2011 Date:2011 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Decision and Game Theory for Security by Baras, John S. Publication: . X, 259 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology - ICISC 2010 by Rhee, Kyung-Hyune. Publication: . XIII, 435p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية