Search Result
Save to File
Your search for
29518
returns
7587
document(s)
Combinatorial algorihtms : theory and practice
Author: Reingold, Edward M.; | Call Number: 511.6 Rei c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Network security essentials applications and standards 2nd ed.
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Smart card security and applications/Mike Hendry
Author: Hendry, Mike; | Call Number: 006 Hen s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
The Art of strategic planning for information technology: crafting strategy for the 90's
Author: Boar, Bernard H.; | Call Number: 658.401 2 Boa a | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Critical issues in information processing management and technology vol. 6
Call Number: 004 Cri | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Critical issues in information processing management and technology vol. 1
Call Number: 004 Cri | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Critical issues in information processing management and technology vol. 2
Call Number: 004 Cri | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Critical issues in information processing management and technology vol. 3
Call Number: 004 Cri | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Critical issues in information processing management and technology vol. 4
Call Number: 004 Cri | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Linux System Security: An administrator's guide to Open Source Security Tools/ Scott Mann and Ellen L. Mitchell
Author: Mann, Scott; | Call Number: 005.43 Man l | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
15
16
17
18
19
20
21
22
23
24
Next