|
|
Combinatorics on Words
by Karhumäki, Juhani.
Publication:
. X, 263 p. 37 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Algebra and Coalgebra in Computer Science
by Heckel, Reiko.
Publication:
. XIV, 359 p. 29 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Fundamentals of Computation Theory
by Gąsieniec, Leszek.
Publication:
. XII, 318 p. 45 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Digital Forensics and Watermaking
by Shi, Yun Q.
Publication:
. XX, 532 p. 245 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Unifying Theories of Programming and Formal Engineering Methods
by Liu, Zhiming.
Publication:
. XII, 283 p. 50 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theories of Programming and Formal Methods
by Liu, Zhiming.
Publication:
. XII, 413 p. 86 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Privacy
by Boyd, Colin.
Publication:
. XII, 437 p. 70 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Applied Cryptography and Network Security
by Jacobson, Michael.
Publication:
. XIV, 572 p. 115 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Frontiers in Algorithmics and Algorithmic Aspects in Information and Management
by Fellows, Michael.
Publication:
. XII, 364 p. 97 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Progress in Cryptology – AFRICACRYPT 2013
by Youssef, Amr.
Publication:
. XIV, 453 p. 33 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Security and Cryptology
by Kutyłowski, Mirosław.
Publication:
. XII, 393 p. 61 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Optical Supercomputing
by Dolev, Shlomi.
Publication:
. X, 137 p. 84 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Theory and Applications of Models of Computation
by Chan, T-H. Hubert.
Publication:
. XV, 356 p. 37 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Recent Trends in Algebraic Development Techniques
by Martí-Oliet, Narciso.
Publication:
. X, 283 p. 71 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Information Theory, Combinatorics, and Search Theory
by Aydinian, Harout.
Publication:
. XL, 773 p. 58 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Engineering Secure Software and Systems
by Jürjens, Jan.
Publication:
. XII, 231 p. 40 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Public-Key Cryptography – PKC 2013
by Kurosawa, Kaoru.
Publication:
. XIV, 518 p. 46 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Pairing-Based Cryptography – Pairing 2012
by Abdalla, Michel.
Publication:
. XVI, 333 p. 18 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Topics in Cryptology – CT-RSA 2013
by Dawson, Ed.
Publication:
. XIV, 405 p. 68 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|
|
Logical Foundations of Computer Science
by Artemov, Sergei.
Publication:
. X, 415 p. 49 illus.
Availability:
Copies available:
AUM Main Library
(1),
|
|