Your search for 2401 returns 4059 document(s) |
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer/ D.W. Davies |
Author: Davies, Donald Watts; | Call Number: 384 Dav s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An AHP Based-Model For Sustainable Manufacturing Performance Evaluation In Automotive Industry (53) |
Author: Elita Amrina
Sha'ri Mohd Yusof; | Call Number: SEM-311 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Building Firm Trust Online |
Author: Detlef Schoder, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Building Personal Tools by Programming |
Author: David Canfield Smith | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Building controls into structured systems |
Author: Brill, Alan E.; | Call Number: 658.401 3 Bri b | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Building controls into structured systems |
Author: Curtis , Graham; | Call Number: 658.403 8 Cur b | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Building decision support systems |
Author: Editor, Bennet, John L.; | Call Number: 658.403 Bui | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Building the realtime user experience |
Author: Roden, Ted; | Call Number: 004.33 Rod b | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Building the operational data store |
Author: Inmon, William H.; | Call Number: 658.403 8 Inm b | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Inside network perimeter security: the definitve guide to firewalls, VPNs, routers, and instruction Detection |
Author: Northcutt, Stephen...[et. al.]; | Call Number: 005.8 Ins | Edition: 2003 | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|