Your search for 2583 returns 462 document(s) |
Cryptography and Network security: principles and practice 4th ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Implementing elliptic curve cryptography/Michael Rosing |
Author: Rosing, Michael; | Call Number: 005.82 Ros i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Image Cryptography using Complex Quadratic Map (97-102) |
Author: Tjanda Satria Gunawan
Herley Shaori Al-Ash
Aniata Murni Arymurthy
Alhadi Bustamam; | Call Number: SEM-373 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Microcomputer experimentation with the motorola mek 6800 D2 |
Author: Leventhal, Lance A.; | Call Number: 004.64 Lev m | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied probability and queues/Saren Asmusen |
Author: Asmussern, Soren; | Call Number: 519.2 Asm a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Digital certificates: applied internet security |
Author: Feghhi, Jalal; | Call Number: 005.8 Feg d | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied XML solutions: the authoritatitve solution |
Author: Marchal, Benoit; | Call Number: 005.72 Mar a | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied queueing theory/ Alec M. Lee |
Author: Lee, ALec M.; | Call Number: 519.82 Lee a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Micro Hydro Generator Applied on Domestic |
Author: T.C. Yan , T. Ibrahim , N.M. Nor; | Call Number: SEM-368 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Digital certificates: applied internet security |
Author: Feghhi, Jalal; | Call Number: 005.8 Feg d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|