Search Result Save to File Save as CSV
Your search for 31976 returns 7462 document(s)
Managing risk in information systems 2nd ed.
Author: Gibson, Darril; | Call Number: 005.8 Gib m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Algorithms in c: parts 1-4 fundamentals data structures sorting searching 3rd ed./Robert Sedgewick
Author: Sedgewick, Robert; | Call Number: 005.133 Sed a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Asynchronous transfer mode: solution for broadband ISDN 3rd ed.
Author: Prycker, Martin; | Call Number: 621.382 Pry a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information retrieval: algorithms and heuristics 2nd ed.
Author: Grossman, David A.; | Call Number: 005.73 gro i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information technology for management improving quality and productivity
Author: Turban, Efraim; | Call Number: 004 Tur i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer forensics: computer crime scene investigation
Author: Vacca, John R.; | Call Number: 363.259 68 Vac c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer forensics: computer crime scene investigation
Author: Vacca, John R.; | Call Number: 363.259 68 Vac c | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Internet cryptography
Author: Smith, Richard E.; | Call Number: 005.82 Smi i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Management information systems: managing information technology in the internet worked enterprise
Author: Obrien, James A.; | Call Number: 658.403 8 Obr m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information technology for management 6th ed.
Author: Lucas, Henry C.; | Call Number: 658.403 8 Luc i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   14 15 16 17 18 19 20 21 22 23  Next