Your search for 33286 returns 6546 document(s) |
Programming embedded systems in c and C++/Michael Barr |
Author: Barr, Michael; | Call Number: 005.133 Bar p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Expert systems for software engineers and managers |
Author: Hu, S. David; | Call Number: 006.33 Hu e | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Review: a review of culture in information systems research: toward a theory of information technology culture conflict, page 357-399 |
Author: Dorothy E. Leidner and Timothy Kayworth | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information assurance for the enterprise: a roadmap to information security/ Corey Schou |
Author: Schou, Corey; | Call Number: 005.8 Sch c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secrets and Lies: Digital security in a Networked world whith new information about post 9/11 security |
Author: Schneier, I Bruce; | Call Number: 005.8 Sch s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information security and privacy: third Australian conference, ACISP'98/Brisbane, Australia, July 13-15, 1998 proceedings |
Call Number: 005.8 Inf | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Manual TransPVM/Hendra Wijaja |
Author: Widjaja, Hendra; | Call Number: 005.3 Wid t | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Algorithm design (INSTRUCTOR'S MANUAL) |
Author: Kleinberg, Jon; | Call Number: 005.1 Kle a | Type: Instructor's Manual
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Principles of information security 5th ed. |
Author: Whitman, Michael E.; | Call Number: 005.8 Whi p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Management of information security 5th ed. |
Author: Whitman, Michael E.; | Call Number: 005.8 Whi m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|