Search Result Save to File Save as CSV
Your search for 2583 returns 462 document(s)
Cryptography and Network security: principles and practice 4th ed.
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Implementing elliptic curve cryptography/Michael Rosing
Author: Rosing, Michael; | Call Number: 005.82 Ros i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Image Cryptography using Complex Quadratic Map (97-102)
Author: Tjanda Satria Gunawan Herley Shaori Al-Ash Aniata Murni Arymurthy Alhadi Bustamam; | Call Number: SEM-373 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Microcomputer experimentation with the motorola mek 6800 D2
Author: Leventhal, Lance A.; | Call Number: 004.64 Lev m | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Applied probability and queues/Saren Asmusen
Author: Asmussern, Soren; | Call Number: 519.2 Asm a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Digital certificates: applied internet security
Author: Feghhi, Jalal; | Call Number: 005.8 Feg d | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Applied XML solutions: the authoritatitve solution
Author: Marchal, Benoit; | Call Number: 005.72 Mar a | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Applied queueing theory/ Alec M. Lee
Author: Lee, ALec M.; | Call Number: 519.82 Lee a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Micro Hydro Generator Applied on Domestic
Author: T.C. Yan , T. Ibrahim , N.M. Nor; | Call Number: SEM-368 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Digital certificates: applied internet security
Author: Feghhi, Jalal; | Call Number: 005.8 Feg d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   6 7 8 9 10 11 12 13 14 15  Next