//]]>
High Performance Networking, Computing, and Communication Systems by Wu, Yanwen. Publication: . XV, 617 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theoretical and Mathematical Foundations of Computer Science by Zhou, Qihai. Publication: . XV, 615 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Information Security by Basin, David. Publication: . XIV, 202 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptographic Protocol by Dong, Ling. Publication: . 250p. 60 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Programming for Engineers by Bradley, Aaron R. Publication: . XIV, 238 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Informatics and Communication by Zhang, Jianwei. Publication: . XIII, 699 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Informatics and Communication by Zhang, Jun. Publication: . XIV, 727 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Informatics and Communication by Zhang, Jun. Publication: . XIV, 689 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Informatics and Communication by Zeng, Dehuai. Publication: . XIV, 745 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Informatics and Communication by Zeng, Dehuai. Publication: . XIII, 753 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Assurance by Kim, Tai-hoon. Publication: . XIV, 406p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Analysis of Rare Categories by He, Jingrui. Publication: . VIII, 136 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Multimedia Communications, Services and Security by Dziech, Andrzej. Publication: . XIV, 354 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
e-Business and Telecommunications by Obaidat, Mohammad S. Publication: . XVII, 359p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Securing Digital Video by Diehl, Eric. Publication: . X, 264 p. 99 illus., 11 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Block Cipher Companion by Knudsen, Lars R. Publication: . XIV, 270 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Policies and Research in Identity Management by Leeuw, Elisabeth. Publication: . X, 145p. 39 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Critical Infrastructure Protection IV by Moore, Tyler. Publication: . XVIII, 260p. 86 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Towards Hardware-Intrinsic Security by Sadeghi, Ahmad-Reza. Publication: . XVI, 407 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Locally Decodable Codes and Private Information Retrieval Schemes by Yekhanin, Sergey. Publication: . XII, 82 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية