//]]>
Arithmetic of Finite Fields by Hasan, M. Anwar. Publication: . 280p. 41 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Future Multimedia Networking by Zeadally, Sherali. Publication: . X, 184p. 115 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Engineering Secure Software and Systems by Massacci, Fabio. Publication: . X, 241 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Crossing of Heaven by Gustafson, Karl. Publication: . XVI, 176 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Classification and Multivariate Analysis for Complex Data Structures by Fichet, Bernard. Publication: . XIX, 473p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Rainbow Connections of Graphs by Li, Xueliang. Publication: . VIII, 103p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Crittografia nel Paese delle Meraviglie by Venturi, Daniele. Publication: . XIV, 500 pagg. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Physically Unclonable Functions by Maes, Roel. Publication: . XVII, 193 p. 28 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Modern Cryptography Primer by Kościelny, Czesław. Publication: . XIV, 238 p. 97 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Introduction to Public Key Infrastructures by Buchmann, Johannes A. Publication: . XV, 194 p. 146 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Bluetooth Security Attacks by Haataja, Keijo. Publication: . VII, 93 p. 31 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Economics of Information Security and Privacy by Böhme, Rainer. Publication: . XIII, 321 p. 57 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Business Process Management Workshops by Rosa, Marcello. Publication: . LVI, 783 p. 264 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
E-Business and Telecommunications by Obaidat, Mohammad S. Publication: . XVI, 536 p. 226 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Understanding High-Dimensional Spaces by Skillicorn, David B. Publication: . IX, 108 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Introduction to Cryptography with Maple by Gómez Pardo, José Luis. Publication: . XXX, 705 p. 20 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Engineering Secure Two-Party Computation Protocols by Schneider, Thomas. Publication: . XVI, 138 p. 35 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fault Analysis in Cryptography by Joye, Marc. Publication: . XVI, 354 p. 98 illus., 35 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Geometric Structure of High-Dimensional Data and Dimensionality Reduction by Wang, Jianzhong. Publication: . Approx. 365 p. 91 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
e-Business and Telecommunications by Obaidat, Mohammad S. Publication: . XVI, 448 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية