Search Result Save to File Save as CSV
Your search for 27516 returns 5727 document(s)
Discrete mathematics with graph theory
Author: Goodaire, Edgar G.; | Call Number: 510 Goo d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography and network security: principles and practice 3rd ed.
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Computer system performance modelling
Author: Sauer, Charles H.; | Call Number: 004 Sau c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Analysis and synthesis of computer systems/ E. Gelenbe
Author: Gelenbe, E.; | Call Number: 004 Gel a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Combinatorial algoriths/Ludel Kucera
Author: Kucera, Ludek; | Call Number: 005.12 Kuc c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan certificate policy dan certification practice statement untuk infrastruktur kunci publik nasional: studi kasus infrastruktur kunci publik nasional indonesia
Author: Tomi Sirait; | Call Number: KA-804 (Softcopy KA-803) MAK KA-461 | Edition: 2016 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Background math for a computer world
Author: Ashley, Ruth; | Call Number: 510 Ash b | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Background math for a computer world/ Ruth Ashley
Author: Ashley, Ruth; | Call Number: 510 Ash b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Background math for a computer world: a self-teaching guide 2nd ed./ Ruth Ashley
Author: Ashley, Ruth; | Call Number: 510 Ash b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computers in the professional practice of design
Author: Brown, Karen M; | Call Number: 720.284 Bro c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   9 10 11 12 13 14 15 16 17 18  Next