//]]>
Intelligent Computer Mathematics by Jeuring, Johan. Publication: . XVIII, 473p. 117 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mathematics of Program Construction by Gibbons, Jeremy. Publication: . X, 363p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applications of Evolutionary Computation by Chio, Cecilia. Publication: . XXV, 542p. 174 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Cryptography by Cramer, Ronald. Publication: . Approx. 670 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Processign in Cells and Tissues by Lones, Michael A. Publication: . XII, 278p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Engineering Secure Software and Systems by Barthe, Gilles. Publication: . XII, 151p. 37 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Graph Drawing by Kreveld, Marc. Publication: . XIV, 458 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security by Lai, Xuejia. Publication: . XIII, 388 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mathematical Morphology and Its Applications to Image and Signal Processing by Soille, Pierre. Publication: . XII, 484p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applications of Evolutionary Computation by Chio, Cecilia. Publication: . XXXI, 367p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applications of Evolutionary Computation by Chio, Cecilia. Publication: . XXXII, 513 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Cryptography by Ishai, Yuval. Publication: . XII, 631 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Engineering Secure Software and Systems by Erlingsson, Úlfar. Publication: . XI, 273p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
WALCOM: Algorithms and Computation by Katoh, Naoki. Publication: . XI, 233p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Graph Drawing by Brandes, Ulrik. Publication: . XIV, 414p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security by Burmester, Mike. Publication: . XIV, 446p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mathematical Software – ICMS 2010 by Fukuda, Komei. Publication: . XIV, 368p. 59 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Graph Drawing by Eppstein, David. Publication: . 426p. 199 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Cryptography by Micciancio, Daniele. Publication: . 607p. 55 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Engineering Secure Software and Systems by Massacci, Fabio. Publication: . X, 241 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
1 2 3 4 5 Next >>

Languages: 
English |
العربية