Your search for 12355 returns 600 document(s) |
Security in computing |
Author: Pfleeger, Charles P.; | Call Number: 005.8 Pfl s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A career in computing |
Author: Penney, George; | Call Number: 371.425 Pen c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Components: what it they gave a revolution and nobady came, page 28 |
Author: Peter M.M | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Beacon signals: what, Why, How, and Where?, page 108 |
Author: Sergei G. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Can you say what your strategy Is?, page 82 |
Author: David J. Collis and Michael G. Rukstad | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
What every leader should know about real estate, page 100 |
Author: Mahlon Apgar, IV | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
What can be automated : the computer science and engineering research study |
Call Number: 004 Wha | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Managing information technology: what managers need to know 2nd edi. |
Author: Martin, E Wairight; | Call Number: 658.403 8 Mar m | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Digital Games and beyond: What happens when players compete?, page 111-124 |
Author: De Liu, Xun Li, Radhika Santhanam | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information systems research behaviors: what are the normative standards? , page 533-551 |
Author: Gove N. Allen, Nicholas L. Ball, and H. Jeff Smith | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|