//]]>
Combinatorics on Words by Karhumäki, Juhani. Publication: . X, 263 p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algebra and Coalgebra in Computer Science by Heckel, Reiko. Publication: . XIV, 359 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Fundamentals of Computation Theory by Gąsieniec, Leszek. Publication: . XII, 318 p. 45 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Digital Forensics and Watermaking by Shi, Yun Q. Publication: . XX, 532 p. 245 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Unifying Theories of Programming and Formal Engineering Methods by Liu, Zhiming. Publication: . XII, 283 p. 50 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theories of Programming and Formal Methods by Liu, Zhiming. Publication: . XII, 413 p. 86 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Boyd, Colin. Publication: . XII, 437 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Cryptography and Network Security by Jacobson, Michael. Publication: . XIV, 572 p. 115 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Frontiers in Algorithmics and Algorithmic Aspects in Information and Management by Fellows, Michael. Publication: . XII, 364 p. 97 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – AFRICACRYPT 2013 by Youssef, Amr. Publication: . XIV, 453 p. 33 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology by Kutyłowski, Mirosław. Publication: . XII, 393 p. 61 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Optical Supercomputing by Dolev, Shlomi. Publication: . X, 137 p. 84 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory and Applications of Models of Computation by Chan, T-H. Hubert. Publication: . XV, 356 p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Recent Trends in Algebraic Development Techniques by Martí-Oliet, Narciso. Publication: . X, 283 p. 71 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Theory, Combinatorics, and Search Theory by Aydinian, Harout. Publication: . XL, 773 p. 58 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Engineering Secure Software and Systems by Jürjens, Jan. Publication: . XII, 231 p. 40 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Public-Key Cryptography – PKC 2013 by Kurosawa, Kaoru. Publication: . XIV, 518 p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Pairing-Based Cryptography – Pairing 2012 by Abdalla, Michel. Publication: . XVI, 333 p. 18 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Topics in Cryptology – CT-RSA 2013 by Dawson, Ed. Publication: . XIV, 405 p. 68 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Logical Foundations of Computer Science by Artemov, Sergei. Publication: . X, 415 p. 49 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية