Search Result Save to File Save as CSV
Your search for 27168 returns 5788 document(s)
The Computer incident response planning handbook: Executable plans for protecting information at risk
Author: McCarthy, N.K.; | Call Number: 005.8 Mcc c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer network: a system approach
Author: Peterson, Larry L.; | Call Number: 004.65 Pet c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Corporate computer and network security
Author: Panko, Raymond; | Call Number: 005.8 Pan c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer forensics: incident reponse essentials/ Warren G. Kruse II
Author: Kruse II, Warren G.; | Call Number: 005.8 Kru c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer organization and programming/ C. William Gear
Author: Gear, William C.; | Call Number: 004.61 Gea c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Unix system v network programming
Author: Rago, Stephen A.; | Call Number: 005.711 Rag u | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer organization and programming 4th ed/C. William Gear
Author: Gear, C. William; | Call Number: 004.61 Gea c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The Technology pf Parallel processing architectures and VLSI hardware vol. 1
Author: DecCegama, Angel L.; | Call Number: 004.35 Dec p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
High-performance communication network/Jean Walran, Pravin Varaiya
Author: Walrand, Jean; | Call Number: 384 Wal h | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Quality of pervice perpustakaan digital berbasis peer to peer
Author: Heri Kurniawan; | Call Number: T-0581 (Softcopy T-0242) Source Code T-0068 | Edition: 2007 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   14 15 16 17 18 19 20 21 22 23  Next