|
|
Application and Theory of Petri Nets
by Haddad, Serge.
Publication:
. XI, 419p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Engineering Secure Software and Systems
by Barthe, Gilles.
Publication:
. XII, 151p. 37 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Network Optimization
by Pahl, Julia.
Publication:
. XIV, 670 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory and Practice of Algorithms in (Computer) Systems
by Marchetti-Spaccamela, Alberto.
Publication:
. X, 266 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Engineering Secure Software and Systems
by Erlingsson, Úlfar.
Publication:
. XI, 273p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Objects and Databases
by Dearle, Alan.
Publication:
. XIV, 161p. 58 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Graph Transformations
by Ehrig, Hartmut.
Publication:
. XII, 419p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Database and XML Technologies
by Lee, Mong Li.
Publication:
. VI, 156p. 59 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithm Engineering
by Müller-Hannemann, Matthias.
Publication:
. XVI, 513 p. 72 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Future Multimedia Networking
by Zeadally, Sherali.
Publication:
. X, 184p. 115 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Engineering Secure Software and Systems
by Massacci, Fabio.
Publication:
. X, 241 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
SOFSEM 2010: Theory and Practice of Computer Science
by Leeuwen, Jan.
Publication:
. XV, 780 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Physically Unclonable Functions
by Maes, Roel.
Publication:
. XVII, 193 p. 28 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Introduction to Cryptography with Maple
by Gómez Pardo, José Luis.
Publication:
. XXX, 705 p. 20 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Engineering Secure Two-Party Computation Protocols
by Schneider, Thomas.
Publication:
. XVI, 138 p. 35 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Fault Analysis in Cryptography
by Joye, Marc.
Publication:
. XVI, 354 p. 98 illus., 35 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Software and Data Technologies
by Cordeiro, José.
Publication:
. XII, 269 p. 99 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Programming for Engineers
by Bradley, Aaron R.
Publication:
. XIV, 238 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Analysis of Rare Categories
by He, Jingrui.
Publication:
. VIII, 136 p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Software and Data Technologies
by Cordeiro, José.
Publication:
. XIII, 291p.
Availability:
Copies available:
AUM Main Library
(1),
|
|