//]]>
Towards an Information Theory of Complex Networks by Dehmer, Matthias. Publication: . XVI, 395p. 114 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithmic Randomness and Complexity by Downey, Rodney G. Publication: . XXVIII, 855p. 8 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Crittografia nel Paese delle Meraviglie by Venturi, Daniele. Publication: . XIV, 500 pagg. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Game Start! by Alinovi, Francesco. Publication: . VII, 296 pagg. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Thinkquest~2010 by Pise, S. J. Publication: . IX, 327p. 120 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory and Practice of Computation by Nishizaki, Shin-ya. Publication: . XII, 295 p. 130 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory and Practice of Computation by Nishizaki, Shin-ya. Publication: . X, 215p. 58 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Natural Computing by Peper, F. Publication: . XII, 390p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Flow Based Security Control Beyond RBAC by Fischer-Hellmann, Klaus-Peter. Publication: . XXI, 161 p. 25 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Combinatorial Search: From Algorithms to Systems by Hamadi, Youssef. Publication: . XIII, 139 p. 30 illus., 16 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
People, Problems, and Proofs by Lipton, Richard J. Publication: . XVIII, 333 p. 33 illus., 5 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Physically Unclonable Functions by Maes, Roel. Publication: . XVII, 193 p. 28 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Modern Cryptography Primer by Kościelny, Czesław. Publication: . XIV, 238 p. 97 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Introduction to Public Key Infrastructures by Buchmann, Johannes A. Publication: . XV, 194 p. 146 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Bluetooth Security Attacks by Haataja, Keijo. Publication: . VII, 93 p. 31 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Economics of Information Security and Privacy by Böhme, Rainer. Publication: . XIII, 321 p. 57 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Distributed Algorithms for Message-Passing Systems by Raynal, Michel. Publication: . XXXI, 500 p. 198 illus., 106 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Massively Parallel Evolutionary Computation on GPGPUs by Tsutsui, Shigeyoshi. Publication: . XII, 453 p. 199 illus., 95 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Business Process Management Workshops by Rosa, Marcello. Publication: . LVI, 783 p. 264 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
E-Business and Telecommunications by Obaidat, Mohammad S. Publication: . XVI, 536 p. 226 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية