Search Result Save to File Save as CSV
Your search for 29518 returns 7587 document(s)
Combinatorial algorihtms : theory and practice
Author: Reingold, Edward M.; | Call Number: 511.6 Rei c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Network security essentials applications and standards 2nd ed.
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Smart card security and applications/Mike Hendry
Author: Hendry, Mike; | Call Number: 006 Hen s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The Art of strategic planning for information technology: crafting strategy for the 90's
Author: Boar, Bernard H.; | Call Number: 658.401 2 Boa a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Critical issues in information processing management and technology vol. 6
Call Number: 004 Cri | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Critical issues in information processing management and technology vol. 1
Call Number: 004 Cri | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Critical issues in information processing management and technology vol. 2
Call Number: 004 Cri | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Critical issues in information processing management and technology vol. 3
Call Number: 004 Cri | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Critical issues in information processing management and technology vol. 4
Call Number: 004 Cri | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Linux System Security: An administrator's guide to Open Source Security Tools/ Scott Mann and Ellen L. Mitchell
Author: Mann, Scott; | Call Number: 005.43 Man l | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   15 16 17 18 19 20 21 22 23 24  Next