title | media type | | ISBN-13 | year of publica- tion | other author(s) |
Algorithms and Theory of Computation Handbook - 2 Volume Set | Hardcover | | 978-1-58488-818-5 | 2009 | Marina Blanton |
Algorithms and Theory of Computation Handbook | " | | 978-0-8493-2649-3 | 1998 |
Algorithms and Theory of Computation Handbook, Volume 1: General Concepts and Techniques | " | | 978-1-58488-822-2 | 2009 | Marina Blanton |
Algorithms and Theory of Computation Handbook, Volume 2: Special Topics and Techniques | Paperback | | 978-0-367-38484-5 | 2019 | " |
Algorithms and Theory of Computation Handbook, Volume 2: Special Topics and Techniques | Hardcover | | 978-1-58488-820-8 | 2009 | " |
Cascading Divide-and-Conquer: A Technique for Designing Parallel Algorithms | Paperback | | 978-1-332-87032-5 | 2018 |
Cryptanalysis of Number Theoretic Ciphers | Hardcover | | 978-1-58488-153-7 | 2002 | Samuel S. Wagstaff Jr. |
Privacy Enhancing Technologies: 9th International Symposium, PETS 2009, Seattle, WA, USA, August 5-7, 2009, Proceedings: 5672 | Taschenbuch | | 978-3-642-03167-0 | 2010 | Ian Goldberg |
The Science of Homeland Security | Hardcover | | 978-1-55753-416-3 | 2006 | Sandra F. Amass · Arun K. Bhunia · Alok R. Chaturvedi · Daniel R. Dolk · Srinivas Peeta |