Your search for 13946 returns 7003 document(s) |
B-Tree Concurrency Control and Recovery in Page-Server Database Systems, page 82-132 |
Author: I. Jaluta, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Open key exchange: how to defeat dictionary attacks without encrypting public keys, (LNCS-Lecture Notes in Computer Science 939) Hal 79-90 |
Author: Stefan Lucks; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Interactive analysis of computer crimes, page 69 |
Author: Donald E. Brown | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Embedded computer architecture and automation, page 75 |
Author: B. Ramakrisma Rau | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Enter the dragon: chine's computer industry, page 28 |
Author: Kenneth L. K. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Simplescalar: an infrastruture for computer system modeling, page 59 |
Author: Todd Austin | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Invasive software: who's inside computer, page 15 |
Author: Geoge Lawton | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The computer graphics wars heat up, page 97 |
Author: Michael M. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer art in the new millenium, page 26 |
Author: Patric D.P. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
C How to program |
Author: Deitel, H.M.; | Call Number: 005.3 Dei c | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|