Search Result Save to File Save as CSV
Your search for 2763 returns 4788 document(s)
National security versus data privacy and security: study of personal data privacy and security in Iran, HAL. 1081-1087
Author: Hassan Allpour and Ebrahim Kiani Harchegant; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Cyber tigers: how companies in Asia can prosper from E-commerce/James K. Ho
Author: Ho, James K.; | Call Number: 658.002 85 Ho c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer hardware description and their applications
Call Number: 621.391 Com | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Digital Design
Author: Mano, M. Morris; | Call Number: 621.395 Man d | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Digital systems engineering
Author: Dally William J.; | Call Number: 621.39 Dal d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer hardware description languages and their applications/edited by MBreuer and R. Hartenstein
Call Number: 621.391 com C | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Failure-tolerant computer design/ William H. Pierce
Author: Pierce, William H.; | Call Number: 004.61 Pie f | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Software architecture in practice/By Len Bass; Paul Clements
Author: Bass, Len; | Call Number: 005.1 Bas s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer architecture and organization
Author: Hayes, John P.; | Call Number: 004.22 Hay c | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Computer architecture and organization 2nd ed.
Author: Hayes, John P.; | Call Number: 004.22 Hay c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   10 11 12 13 14 15 16 17 18 19  Next