Search Result Save to File Save as CSV
Your search for 2712 returns 5272 document(s)
Electronic Design
Call Number: [38(1990): 1,3-5,7-9, 39 (1991): 10-14, 39 (1991): 15-20, 39 (1991): 21-24, 40 (1992): 1-6, 40 (1992): 6-8, 40 (1992): 7-12, 40 (1992): 9-12, 40 (1992): 13-20, 40 (1992): 20-26, 40 (1992): 21-25, 41 (1993): 1-4, 41 (1993): 5,7-8, 41 (1993): 8-11, 41 (1993): 12-14, 41 (1993): 15-18, 41 (1993): 19-23, 42 (1994): 13-17, 42 (1994): 18-20, 42 (1994): 21, 43 (1995): 7-12] | Type: Jurnal/ Majalah
Find Similar |  Add To Favorites |  Detail in New Window 
Electronic products
Call Number: [28 (1986): 17-21, 29 (1986): 3-6, 30 (1987): 10-14] | Type: Jurnal/ Majalah
Find Similar |  Add To Favorites |  Detail in New Window 
Patterns for e-business : a strategy for reuse
Author: Adams, Jonathan; | Call Number: 658.84 Ada p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
E-business 2.0 roadmap for success 2nd ed.
Author: Kalakota, Ravi; | Call Number: 658.84 Kal e | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Analisa adopsi software as a service (SaaS) sebagai alternatif penyediaan layanan perangkat lunak: studi kasus E-Office PT TELKOM
Author: Yoke Yuni Karnida; | Call Number: T-0899 (Softcopy T-0553) | Edition: 2010 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Microsoft data mining: Integrated business intelligence for e-commerce and knowledge management
Author: Ville, Barry de; | Call Number: 006.3 Vil m | Edition: 2000 | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Applying use case driven object modeling with uml : an annotated e-commerce example
Author: Rosenberg Doug; | Call Number: 005.117 Ros a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Protection and security on the information superhighway
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Hacking: the art of exploitation 2nd ed.
Author: Erickson, Jon; | Call Number: 005.8 Eri h | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security principles and practice 3 rd ed.
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   18 19 20 21 22 23 24 25 26 27  Next