Search Result Save to File Save as CSV
Your search for 31976 returns 7430 document(s)
Applied cryptography: protocols, algorithms and source code in C
Author: Schneier, Bruce; | Call Number: 005.82 Sch a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
AP Computer science A and AB 3rd ed
Author: Horwitz, Susan; | Call Number: 005.133 Hor a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security handbook/editor Arthur, E. Hutt Seymour
Call Number: R.658.478 02 Com | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Secrets and Lies: Digital security in a Networked world whith new information about post 9/11 security
Author: Schneier, I Bruce; | Call Number: 005.8 Sch s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Database management systems 3rd ed.
Author: Ramakrishnan, Raghu; | Call Number: 005.74 Ram d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Programming microsoft windows CE. net 3rd ed.
Author: Boling, Douglas; | Call Number: 005.446 9 Bol p | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prolog programming for artificial intelligence 3rd ed.
Author: Bratko, Ivan; | Call Number: 006.3 Bra p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Multimedia for learning methods and development 3rd ed.
Author: Alessi Stephen M.; | Call Number: 371.334 Ale m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The Shellcoder's handbook: discovering and exploiting security holes 2nd ed.
Call Number: 005.8 She | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer networks: a systems approach 3rd ed. / Larry L. Peterson
Author: Peterson, Larry L.; | Call Number: 004.65 Pet c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   9 10 11 12 13 14 15 16 17 18  Next