Search Result Save to File Save as CSV
Your search for 27281 returns 6520 document(s)
Internet cryptography
Author: Smith, Richard E.; | Call Number: 005.82 Smi i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
A Distributed community approach for protection resources in digital ecosystem, Hal. 95-100
Author: Hung Pranata, Geoff Skinner, Rukshan Athauda; | Call Number: SEM-301 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
IT auditing : using controls to protect iformation assets 2nd ed
Author: Davis, Chris; | Call Number: 658.05 Dav i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Build your own Z80 computer: design guidelines and applications notes/Steve Ciarcia
Author: Ciarcia, Steve; | Call Number: 621.39 Cia b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Application development without programmers
Author: Martin, James; | Call Number: 004 Mar a | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Author: "Tremblay, Jean-Paul; "; | Call Number: 519.7 Tre i | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Application development without programmers
Author: Martin, James; | Call Number: 004 Mar a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Modern computer concepts/ Joseph C. Giarratano
Author: Giarratano, Joseph C.; | Call Number: 621.381 9 Gia m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Principles of digital design
Author: Gajski, Daniel D.; | Call Number: 621.395 Gaj p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Data protection in health information systems considerations and guidelines/ edited by G.G.Griesser
Call Number: 651.504 261 Dat | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   10 11 12 13 14 15 16 17 18 19  Next