Search Result
Save to File
Your search for
31976
returns
7430
document(s)
Applied cryptography: protocols, algorithms and source code in C
Author: Schneier, Bruce; | Call Number: 005.82 Sch a | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
AP Computer science A and AB 3rd ed
Author: Horwitz, Susan; | Call Number: 005.133 Hor a | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer security handbook/editor Arthur, E. Hutt Seymour
Call Number: R.658.478 02 Com | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Secrets and Lies: Digital security in a Networked world whith new information about post 9/11 security
Author: Schneier, I Bruce; | Call Number: 005.8 Sch s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Database management systems 3rd ed.
Author: Ramakrishnan, Raghu; | Call Number: 005.74 Ram d | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Programming microsoft windows CE. net 3rd ed.
Author: Boling, Douglas; | Call Number: 005.446 9 Bol p | Type: Softcopy Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prolog programming for artificial intelligence 3rd ed.
Author: Bratko, Ivan; | Call Number: 006.3 Bra p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Multimedia for learning methods and development 3rd ed.
Author: Alessi Stephen M.; | Call Number: 371.334 Ale m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
The Shellcoder's handbook: discovering and exploiting security holes 2nd ed.
Call Number: 005.8 She | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer networks: a systems approach 3rd ed. / Larry L. Peterson
Author: Peterson, Larry L.; | Call Number: 004.65 Pet c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
9
10
11
12
13
14
15
16
17
18
Next