Search Result Save to File Save as CSV
Your search for 27993 returns 5709 document(s)
Applied cryptography: protocols, algorithms and source code in C
Author: Schneier, Bruce; | Call Number: 005.82 Sch a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer network architectures/ Anton Meijer
Author: Meijer, Anton; | Call Number: 004.16 Mei c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
E-Commerce security strategies: protecting the enterprise
Author: Cameron, Debra; | Call Number: 658.478 Cam e | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The cydades computer network/ edited by L. Pouzen
Author: Fouzin, L.; | Call Number: 004.6 | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer graphics: principles and practice second edition/James D. Foley ...[et al]
Author: Foley, James D.; | Call Number: 006.6 Com | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer graphics: principles and practice 2nd ed in C/ James F. Foley
Call Number: 006.66Com | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer/ D.W. Davies
Author: Davies, Donald Watts; | Call Number: 384 Dav s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Internet Besieged: Countering Cyberspace Scofflans/Dorothy Denning and Peter J. Denning
Author: Denning Dorothy E.; | Call Number: 364.168 Int | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Applied cryptography: protocols, algorithms, and sources code in C
Author: Schmeier, Bruce; | Call Number: 005.82 Sch a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Local computer network technologies/ Carl Tropper
Author: Tropper, Carl; | Call Number: 621.381 Tro l | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   2 3 4 5 6 7 8 9 10 11  Next