Search Result Save to File Save as CSV
Your search for 2660 returns 4868 document(s)
Analisa rancangan untuk meningkatkan kinerja jaringan UI terpadu(JUITA)
Author: Indra S Tobing; | Call Number: T-0172 | Edition: 2000 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Computer networks and their protocols
Author: Davies, D.W.; | Call Number: 004.6 Dav c | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Local area network architectures
Author: Hutchinson, David M.; | Call Number: 004.68 Hut l | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Data communications & teleprocessing systems 2nd ed/ Trevor Housley
Author: Housley, Trevor; | Call Number: 384.3 Hou d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Gigabit networks: standards and schemes for next-generation networking/Paul Izzo
Author: Izzo, Paul; | Call Number: 004.62 Izz g | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Internetworking with TCP/IP vol. 1: principles, protocol, and architecture 6th ed.
Author: Comer, Douglas E.; | Call Number: 004.6 Com i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Internet firewalls and network security/R. Christopher E. Hare ...[et.al]
Author: Siyan, Karanjit; Hare, R. Christhoper E.; | Call Number: 005.8 Siy i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Internet & TCP/IP network security: securing protocols and applications/Uday I. Prabai, Vijay K. Garbani
Author: Pabrai, Uday I.; | Call Number: 005.8 Pab i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Principles of information security 5th ed.
Author: Whitman, Michael E.; | Call Number: 005.8 Whi p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Management of information security 5th ed.
Author: Whitman, Michael E.; | Call Number: 005.8 Whi m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   5 6 7 8 9 10 11 12 13 14  Next