Search Result Save to File Save as CSV
Your search for 12355 returns 600 document(s)
Security in computing
Author: Pfleeger, Charles P.; | Call Number: 005.8 Pfl s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
A career in computing
Author: Penney, George; | Call Number: 371.425 Pen c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Components: what it they gave a revolution and nobady came, page 28
Author: Peter M.M | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Beacon signals: what, Why, How, and Where?, page 108
Author: Sergei G. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Can you say what your strategy Is?, page 82
Author: David J. Collis and Michael G. Rukstad | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
What every leader should know about real estate, page 100
Author: Mahlon Apgar, IV | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
What can be automated : the computer science and engineering research study
Call Number: 004 Wha | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Managing information technology: what managers need to know 2nd edi.
Author: Martin, E Wairight; | Call Number: 658.403 8 Mar m | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Digital Games and beyond: What happens when players compete?, page 111-124
Author: De Liu, Xun Li, Radhika Santhanam | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Information systems research behaviors: what are the normative standards? , page 533-551
Author: Gove N. Allen, Nicholas L. Ball, and H. Jeff Smith | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   7 8 9 10 11 12 13 14 15 16  Next