Search Result
Save to File
Your search for
27989
returns
3395
document(s)
Security Challenges in Wireless Mesh Network Deployment and User Authentication (EAP) Method (V1-333 -- V1-337)
Author: Min Lin Shaoyong Chen; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Probability theory and computer science / edited by G. Louchard and G. Latouche.
Call Number: 519.2 Pro | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Probability theory and computer science / edited by G. Louchard and G. Latouche.
Call Number: 519.2 Pro | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer science advanced placement guide book
Author: Parnell, John E.; | Call Number: 004.61 Par c | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Introduction to computer science: an algorithmic approach 2nd ed.
Author: Tremblay, Jean-Paul; | Call Number: 005 Tre I | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Data abstraction and structures an introduction to computer science II
Author: "Riley, David D."; | Call Number: 005.7 Ril d | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Discrete mathematical structures with applications to computer science
Author: Tremblay, J.P.; | Call Number: 510.24 Tre d | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Graph theory with applications to algorithms and computer science
Call Number: 511.5 Gra | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Java an introduction to computer science & programming third ed.
Author: Savitch Walter; | Call Number: 005.133 Sav j | Type: Softcopy Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer graphics: an object-oriented approach to the art and science
Call Number: 006.66 Pok c | Type: Softcopy Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
16
17
18
19
20
21
22
23
24
25
Next