Your search for 2660 returns 4868 document(s) |
Analisa rancangan untuk meningkatkan kinerja jaringan UI terpadu(JUITA) |
Author: Indra S Tobing; | Call Number: T-0172 | Edition: 2000 | Type: Tesis
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer networks and their protocols |
Author: Davies, D.W.; | Call Number: 004.6 Dav c | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Local area network architectures |
Author: Hutchinson, David M.; | Call Number: 004.68 Hut l | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Data communications & teleprocessing systems 2nd ed/ Trevor Housley |
Author: Housley, Trevor; | Call Number: 384.3 Hou d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Gigabit networks: standards and schemes for next-generation networking/Paul Izzo |
Author: Izzo, Paul; | Call Number: 004.62 Izz g | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Internetworking with TCP/IP vol. 1: principles, protocol, and architecture 6th ed. |
Author: Comer, Douglas E.; | Call Number: 004.6 Com i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Internet firewalls and network security/R. Christopher E. Hare ...[et.al] |
Author: Siyan, Karanjit; Hare, R. Christhoper E.; | Call Number: 005.8 Siy i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Internet & TCP/IP network security: securing protocols and applications/Uday I. Prabai, Vijay K. Garbani |
Author: Pabrai, Uday I.; | Call Number: 005.8 Pab i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Principles of information security 5th ed. |
Author: Whitman, Michael E.; | Call Number: 005.8 Whi p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Management of information security 5th ed. |
Author: Whitman, Michael E.; | Call Number: 005.8 Whi m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|