//]]>
Application and Theory of Petri Nets by Haddad, Serge. Publication: . XI, 419p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Engineering Secure Software and Systems by Barthe, Gilles. Publication: . XII, 151p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Network Optimization by Pahl, Julia. Publication: . XIV, 670 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory and Practice of Algorithms in (Computer) Systems by Marchetti-Spaccamela, Alberto. Publication: . X, 266 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Engineering Secure Software and Systems by Erlingsson, Úlfar. Publication: . XI, 273p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Objects and Databases by Dearle, Alan. Publication: . XIV, 161p. 58 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Graph Transformations by Ehrig, Hartmut. Publication: . XII, 419p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Database and XML Technologies by Lee, Mong Li. Publication: . VI, 156p. 59 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithm Engineering by Müller-Hannemann, Matthias. Publication: . XVI, 513 p. 72 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Future Multimedia Networking by Zeadally, Sherali. Publication: . X, 184p. 115 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Engineering Secure Software and Systems by Massacci, Fabio. Publication: . X, 241 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
SOFSEM 2010: Theory and Practice of Computer Science by Leeuwen, Jan. Publication: . XV, 780 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Physically Unclonable Functions by Maes, Roel. Publication: . XVII, 193 p. 28 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Introduction to Cryptography with Maple by Gómez Pardo, José Luis. Publication: . XXX, 705 p. 20 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Engineering Secure Two-Party Computation Protocols by Schneider, Thomas. Publication: . XVI, 138 p. 35 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fault Analysis in Cryptography by Joye, Marc. Publication: . XVI, 354 p. 98 illus., 35 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Software and Data Technologies by Cordeiro, José. Publication: . XII, 269 p. 99 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Programming for Engineers by Bradley, Aaron R. Publication: . XIV, 238 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Analysis of Rare Categories by He, Jingrui. Publication: . VIII, 136 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Software and Data Technologies by Cordeiro, José. Publication: . XIII, 291p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 Next >>

Languages: 
English |
العربية