Products

Product categories

Filters

Filters

Clear all
2 products
Sort by
Sort by
Development of some encryption algorithms using chaotic functions: An example of chaos based information security,Used Development of some encryption algorithms using chaotic functions: An example of chaos based information security,Used
Add to wishlist
Quick view
Add to compare
Development of some encryption algorithms using chaotic functions: An example...
In today's information society, cryptography has become one of the main tools for privacy, trust, access control, electronic payments, corporate security, and countless other fields....
Sale price$69.62 Regular price$99.46
Quantity
Add to cart
Not The Whole Story: Challenging The Single Mother Narrative (Life Writing, 51),Used Not The Whole Story: Challenging The Single Mother Narrative (Life Writing, 51),Used
Add to wishlist
Quick view
Add to compare
Not The Whole Story: Challenging The Single Mother Narrative (Life...
Not the Whole Story is a compilation of sixteen stories narrated by single mothers in their own way and about their own lives. Each story...
Sale price$24.40 Regular price$34.86
Quantity
Add to cart

Recently viewed products