انتشارات Morgan Kaufmann, Elsevier Inc

Emerging trends in ICT security
Babak Akhgar, 2014
Fault-Tolerant Systems
Israel Koren, 2007
Foundations of multidimensional and metric data structures
Hanan Samet, 2006
Effective Prototyping for Software Makers
Jonathan Arnowitz, Michael Arent, 2007
Digital Modeling of Material Appearance
Julie Dorsey, Holly Rushmeier, 2008
Computer and information security handbook
John R. Vacca, 2009
Computer and information security handbook
John R. Vacca, 2009
Computer and information security handbook
John R. Vacca, 2009
Data mining : know it all
Soumen Chakrabarti, 2009
Data mining: know it all
Soumen Chakrabarti, 2009
High speed digital design : design of high speed interconnects and signaling
Krooswyk, Steven; Ou, Jeffrey; Zhang, Hanqiao, 2015
High speed digital design : design of high speed interconnects and signaling
Krooswyk, Steven; Ou, Jeffrey; Zhang, Hanqiao, 2015
Distributed algorithms
Lynch, Nancy A, 1996
Digital Watermarking and Steganography, 2nd Ed
Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich, Ton Kalker, 2008
Machine Learning. A Constraint-based Approach
Marco Gori, 2018
Disappearing cryptography: information hiding: steganography & watermarking
Wayner, Peter, 2009
API Design for C++
Reddy, Martin, 2011
CUDA Programming: A Developer's Guide to Parallel Computing with GPUs
Cook, Shane, 2013