Your search for 27281 returns 6520 document(s) |
Internet cryptography |
Author: Smith, Richard E.; | Call Number: 005.82 Smi i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Distributed community approach for protection resources in digital ecosystem, Hal. 95-100 |
Author: Hung Pranata, Geoff Skinner, Rukshan Athauda; | Call Number: SEM-301 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
IT auditing : using controls to protect iformation assets 2nd ed |
Author: Davis, Chris; | Call Number: 658.05 Dav i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Build your own Z80 computer: design guidelines and applications notes/Steve Ciarcia |
Author: Ciarcia, Steve; | Call Number: 621.39 Cia b | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Application development without programmers |
Author: Martin, James; | Call Number: 004 Mar a | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
|
Author: "Tremblay, Jean-Paul; "; | Call Number: 519.7 Tre i | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Application development without programmers |
Author: Martin, James; | Call Number: 004 Mar a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Modern computer concepts/ Joseph C. Giarratano |
Author: Giarratano, Joseph C.; | Call Number: 621.381 9 Gia m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Principles of digital design |
Author: Gajski, Daniel D.; | Call Number: 621.395 Gaj p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Data protection in health information systems considerations and guidelines/ edited by G.G.Griesser |
Call Number: 651.504 261 Dat | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|