//]]>
Quantum Interaction by Busemeyer, Jerome R. Publication: . X, 239 p. 24 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Quantum Computation, Communication, and Cryptography by Iwama, Kazuo. Publication: . VIII, 153 p. 7 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptology and Network Security by Pieprzyk, Josef. Publication: . XVI, 311 p. 48 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Cryptology by Wu, Chuan-Kun. Publication: . X, 394 p. 56 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Search Computing by Ceri, Stefano. Publication: . XII, 255 p. 95 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Secure IT Systems by Jøsang, Audun. Publication: . X, 247 p. 62 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information and Communications Security by Chim, Tat Wing. Publication: . XVI, 506 p. 120 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Privacy in Statistical Databases by Domingo-Ferrer, Josep. Publication: . XII, 365 p. 70 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in Cryptology – LATINCRYPT 2012 by Hevia, Alejandro. Publication: . XII, 323 p. 26 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theoretical Computer Science by Baeten, Jos C. M. Publication: . X, 393 p. 76 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Cryptographic Hardware and Embedded Systems – CHES 2012 by Prouff, Emmanuel. Publication: . XVII, 562 p. 189 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theoretical Aspects of Computing – ICTAC 2012 by Roychoudhury, Abhik. Publication: . XII, 259 p. 74 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Theoretic Security by Smith, Adam. Publication: . XI, 219 p. 28 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Digital Forensics and Watermarking by Shi, Yun Qing. Publication: . X, 512 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Transactions on Data Hiding and Multimedia Security VIII by Shi, Yun Q. Publication: . IX, 103 p. 27 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Arithmetic of Finite Fields by Özbudak, Ferruh. Publication: . XII, 247p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Developments in Language Theory by Yen, Hsu-Chun. Publication: . XIII, 478p. 65 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Languages Alive by Bordihn, Henning. Publication: . X, 291 p. 29 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Progress in VLSI Design and Test by Rahaman, Hafizur. Publication: . XXIV, 408 p. 275 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security and Privacy by Susilo, Willy. Publication: . XIV, 460p. 46 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية