Your search for 27281 returns 6520 document(s) |
Artificial Intelligence: Concepts, techniques and applications |
Author: Shirai, Yoshiaki; Tsujii,Jun-ichi; | Call Number: 006.3 Shi a | Edition: 1985 | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Expert system: techniques, tools, and applications |
Call Number: 006.33 Kla e | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Engineering reliability: new techniques and applications |
Author: Dhillon, B.S.; | Call Number: 620.004 Dhi e | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer models in operations management: a computer-augmented system |
Author: Harris, Roy D.; | Call Number: 658.403 2 Har c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Hacking: the art of exploitation 2nd ed. |
Author: Erickson, Jon; | Call Number: 005.8 Eri h | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer security principles and practice 3 rd ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Shellcoder's handbook: discovering and exploiting security holes 2nd ed. |
Call Number: 005.8 She | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Managing risk in information systems |
Author: Gibson, Darril; | Call Number: 005.8 Gib m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Corporate computer security 4th ed. |
Author: Boyle, Randall J.; | Call Number: 005.8 Boy c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Managing risk in information systems 2nd ed. |
Author: Gibson, Darril; | Call Number: 005.8 Gib m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|