//]]>
Engineering secure software and systems : , Second International Symposium, Essos 2010, Pisa, Italy, February 3-4, 2010, proceedings /   Publication: Berlin : Springer, 2010 . x, 240 p. : Date:2010 Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Technology Convergence, Secure and Trust Computing, and Data Management by Park, Jong Hyuk (James). Publication: . XXXII, 296 p. 131 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Chaos-Based Cryptography by Kocarev, Ljupco. Publication: . X, 390p. 161 illus., 67 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Digital Video and Audio Broadcasting Technology by Fischer, Walter. Publication: . XXVII, 800p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Handbook of Information and Communication Security by Stavroulakis, Peter. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advances in Computational Science, Engineering and Information Technology by Nagamalai, Dhinaharan. Publication: . XX, 326 p. 135 illus., 13 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Structures de données et méthodes formelles by Guyomard, Marc. Publication: . XVI, 438 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Speech Dereverberation by Naylor, Patrick A. Publication: . XVIII, 388p. 126 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Advanced DPA Theory and Practice by Peeters, Eric. Publication: . XVI, 139 p. 70 illus., 20 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Physical Unclonable Functions in Theory and Practice by Böhm, Christoph. Publication: . XVIII, 270 p. 217 illus., 146 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy-Preserving Machine Learning for Speech Processing by Pathak, Manas A. Publication: . XVII, 141 p. 21 illus., 13 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Securing Wireless Communications at the Physical Layer by Liu, Ruoheng. Publication: Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Big Data by Gottlob, Georg. Publication: . XII, 303 p. 89 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Application and Theory of Petri Nets and Concurrency by Colom, José-Manuel. Publication: . XII, 411 p. 166 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Engineering Secure Software and Systems by Jürjens, Jan. Publication: . XII, 231 p. 40 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
SOFSEM 2013: Theory and Practice of Computer Science by Emde Boas, Peter. Publication: . XIV, 566 p. 131 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applications of Graph Transformations with Industrial Relevance by Schürr, Andy. Publication: . XII, 255 p. 133 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Graph Transformations by Ehrig, Hartmut. Publication: . XII, 427 p. 166 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Generic and Indexed Programming by Gibbons, Jeremy. Publication: . VII, 259 p. 24 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in VLSI Design and Test by Rahaman, Hafizur. Publication: . XXIV, 408 p. 275 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 Next >>

Languages: 
English |
العربية