Search Result Save to File Save as CSV
Your search for 35457 returns 248 document(s)
Malicious code moves to mobile devices, page 16
Author: Neal Leavitt | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
XML development with JAVA 2: portable data & code
Author: Daconta, Michael C.; | Call Number: 005.72 Dac x | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Practical Algorithms for Image Analysis: Description, Examples, and Code
Author: Seul, Michael; | Call Number: 621.367 Seu p | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Temporal logic for proof-carrying code, Hal. 31-46
Author: Andrew Bernard and Peter Lee; | Call Number: SEM-281 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Clean code: a Handbook of agile software craftsmanship
Author: Martin, Robert C.; | Call Number: 005.1 Mar c | Type: E-book
Find Similar |  Add To Favorites |  Detail in New Window 
Clean code: a Handbook of agile software craftsmanship
Author: Martin, Robert C.; | Call Number: 005.1 Mar c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Code reading: the open source perspective/ Diomidis Spinellis
Author: Spinellis, Diomidis; | Call Number: 005.1 Spi c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
XML development with JAVA 2: portable data & code
Author: Daconta, Michael C.; | Call Number: 005.72 Dac x | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Applied cryptography: protocols, algorithms, and sources code in C
Author: Schmeier, Bruce; | Call Number: 005.82 Sch a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Penerapan QR-Code Dalam Absensi Karyawan (247-254)
Author: Kurniawan Teguh Martono Hendry; | Call Number: SEM-327 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   4 5 6 7 8 9 10 11 12 13  Next