Your search for 1861 returns 4161 document(s) |
Practical Algorithms for Image Analysis: Description, Examples, and Code |
Author: Seul, Michael; | Call Number: 621.367 Seu p | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Introduction to network security theory and practice |
Author: Wang, Jie; | Call Number: 005.8 Wan i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Preliminary Study of Hopping Code Technique Applied in PKE System (V1-148 -- V1-151) |
Author: Hesheng Cheng
Lu Ding
Hexia Cheng; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Code complete 2nd ed. |
Author: McConnell, Steve; | Call Number: 005.1 Mcc c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
BRAILLE CODE TRAINER |
Author: Syahrul; | Call Number: SEM-341 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied APL programming |
Author: LePage, Wilbur R.; | Call Number: 005.133 LeP a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied APL programming |
Author: LePage, Wilbur R.; | Call Number: 005.133 Lep a | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Introduction to algorithms |
Author: Cormen, Thomas H.; | Call Number: 005.1 Cor i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Protection and security on the information superhighway |
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Hacking: the art of exploitation 2nd ed. |
Author: Erickson, Jon; | Call Number: 005.8 Eri h | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|