Search Result Save to File Save as CSV
Your search for 3503 returns 5853 document(s)
Implementing elliptic curve cryptography/Michael Rosing
Author: Rosing, Michael; | Call Number: 005.82 Ros i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Applied data communications : a business -oriented approach 3rd ed.
Author: Goldman, James E.; | Call Number: 658.054 6 Gol a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Security engineering: a guide to building dependable distributed systems
Author: Anderson, Ross; | Call Number: 005.8 And s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information security management handbook 5th ed/ Harold Tipton F.
Call Number: 658.055 8 Inf | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Mobile IP: design principles and practices
Author: Perkins, Charles E.; | Call Number: 004.62 Per m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Principles of protocol engineering and conformance testing
Author: Sarikaya, Behcet; | Call Number: 00571 Sar p | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Practical neural network recipes in c++/ Timothy Masters
Author: Masters, Timothy; | Call Number: 006.3 Mas p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
TCP/IP : running a successful network/ Washburn K.
Author: Washburn K.; | Call Number: 004.6 Was t | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Maximum linux security: a hacker's guide to protecting your linux server and workstation
Author: Anonymous; | Call Number: 005.43 Ano m | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Certified information security management (CISM Review Manual 2013)
Call Number: 658.478 Cer | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   14 15 16 17 18 19 20 21 22 23  Next