|
|
Towards an Information Theory of Complex Networks
by Dehmer, Matthias.
Publication:
. XVI, 395p. 114 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algorithmic Randomness and Complexity
by Downey, Rodney G.
Publication:
. XXVIII, 855p. 8 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Crittografia nel Paese delle Meraviglie
by Venturi, Daniele.
Publication:
. XIV, 500 pagg.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Game Start!
by Alinovi, Francesco.
Publication:
. VII, 296 pagg.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Thinkquest~2010
by Pise, S. J.
Publication:
. IX, 327p. 120 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory and Practice of Computation
by Nishizaki, Shin-ya.
Publication:
. XII, 295 p. 130 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory and Practice of Computation
by Nishizaki, Shin-ya.
Publication:
. X, 215p. 58 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Natural Computing
by Peper, F.
Publication:
. XII, 390p.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Flow Based Security Control Beyond RBAC
by Fischer-Hellmann, Klaus-Peter.
Publication:
. XXI, 161 p. 25 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Combinatorial Search: From Algorithms to Systems
by Hamadi, Youssef.
Publication:
. XIII, 139 p. 30 illus., 16 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
People, Problems, and Proofs
by Lipton, Richard J.
Publication:
. XVIII, 333 p. 33 illus., 5 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Physically Unclonable Functions
by Maes, Roel.
Publication:
. XVII, 193 p. 28 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Modern Cryptography Primer
by Kościelny, Czesław.
Publication:
. XIV, 238 p. 97 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Introduction to Public Key Infrastructures
by Buchmann, Johannes A.
Publication:
. XV, 194 p. 146 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Bluetooth Security Attacks
by Haataja, Keijo.
Publication:
. VII, 93 p. 31 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
The Economics of Information Security and Privacy
by Böhme, Rainer.
Publication:
. XIII, 321 p. 57 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Distributed Algorithms for Message-Passing Systems
by Raynal, Michel.
Publication:
. XXXI, 500 p. 198 illus., 106 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Massively Parallel Evolutionary Computation on GPGPUs
by Tsutsui, Shigeyoshi.
Publication:
. XII, 453 p. 199 illus., 95 illus. in color.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Business Process Management Workshops
by Rosa, Marcello.
Publication:
. LVI, 783 p. 264 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
E-Business and Telecommunications
by Obaidat, Mohammad S.
Publication:
. XVI, 536 p. 226 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|