Search Result Save to File Save as CSV
Your search for 1861 returns 4161 document(s)
Practical Algorithms for Image Analysis: Description, Examples, and Code
Author: Seul, Michael; | Call Number: 621.367 Seu p | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Introduction to network security theory and practice
Author: Wang, Jie; | Call Number: 005.8 Wan i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
A Preliminary Study of Hopping Code Technique Applied in PKE System (V1-148 -- V1-151)
Author: Hesheng Cheng Lu Ding Hexia Cheng; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Code complete 2nd ed.
Author: McConnell, Steve; | Call Number: 005.1 Mcc c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
BRAILLE CODE TRAINER
Author: Syahrul; | Call Number: SEM-341 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Applied APL programming
Author: LePage, Wilbur R.; | Call Number: 005.133 LeP a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Applied APL programming
Author: LePage, Wilbur R.; | Call Number: 005.133 Lep a | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Introduction to algorithms
Author: Cormen, Thomas H.; | Call Number: 005.1 Cor i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Protection and security on the information superhighway
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Hacking: the art of exploitation 2nd ed.
Author: Erickson, Jon; | Call Number: 005.8 Eri h | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   4 5 6 7 8 9 10 11 12 13  Next