Your search for 30143 returns 5017 document(s) |
Hacking: the art of exploitation 2nd ed. |
Author: Erickson, Jon; | Call Number: 005.8 Eri h | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Discrete computational structures 2nd ed. |
Author: Korfhage, Robert R.; | Call Number: 005.1 Kor d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer system architecture 2nd ed. |
Author: Mano, M. Morris; | Call Number: 621.392 Man C | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer architecture and organization 2nd ed. |
Author: Hayes, John P.; | Call Number: 004.22 Hay c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Art of software testing 2nd ed. |
Author: Myers, Glenford J; | Call Number: 005.14 Mye a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
ANS COBOL : a self-teaching guide 2nd ed/ Ruth Ashley |
Author: Anshley, Ruth; | Call Number: 005.133 Ash a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Common LISP: the language 2nd ed./Guy L. Steele Jr. |
Author: Steele, Guy; | Call Number: 005.133 Ste c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Essential system administration 2nd ed. |
Author: Frisch, Aeleen; | Call Number: 005.43 Fri e | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
ML for the working programmer 2nd ed. |
Author: Paulson, Lawrence C.; | Call Number: 005.133 Pau m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Management of information security 2nd ed. |
Author: Whitman, Michael E.; | Call Number: 005.8 Whi m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|