Search Result Save to File Save as CSV
Your search for 27989 returns 3395 document(s)
Computer-communication network design and analysis/ Mischa Schwartz
Author: Schwartz, Mischa; | Call Number: 621.39 Sch C | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security basics/editor Deborah Russell and G.T. Gangemi S.R.
Call Number: 005.8 Com | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Foiling the system breakers: computer security and access control/ Jerome Lobel
Author: Lobel, Jerome; | Call Number: 005.8 Lob f | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security risk management/ I.C. Palmer; G.A. Potter
Author: Palmer, I.C.; | Call Number: 005.8 Pal c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Trojans, Worms, and spyware: a computer security professional's guide to malicious code
Author: Erbschloe, Michael; | Call Number: 005.84 Erb t | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security risk analysis and control a guide for the dp manager
Author: Wong, KK; | Call Number: 658.47 Won r | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The art and science of c:: a library - based introduction to computer science/Eric S. Roberts
Author: Roberts, Eric S.; | Call Number: 005.133 Rob a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Proceedings: the 19th annual international symposium on computer architecture/ACM
Call Number: 004.220 6 Pro | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
CAD(Computer aided design): international directory 1986/ Tektonix
Call Number: 604.202 8 CAD | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Proceedings the 18th annual international symposium on computer architecture May 27-30, 1991
Call Number: SEM-094 | Type: Prosiding Seminar
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   14 15 16 17 18 19 20 21 22 23  Next