Search Result Save to File Save as CSV
Your search for 35815 returns 1830 document(s)
Computer networks 4th ed.
Author: Tenembaum, Anrew S.; | Call Number: 004.36 Tan c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer networks 4th ed.
Author: Tanenbaum, Andrew S.; | Call Number: 004.6 Tan c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Neural networks in computer intelligence
Author: Fu, Limin; | Call Number: 006.3 Fu n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Lotus notes and domino 4.5 architecture, adminstration, and security/Scott L. Thomas < Bradley
Author: Thomas, Scott L.; | Call Number: 005.369 Tho l | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer and information security handbook
Author: Vacca, John R.; | Call Number: 005.8 Vac c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Physical security for IT/ Michael Erbschloe
Author: Erbschloe, Michael; | Call Number: 005.8 Erb p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security principles and practice 3 rd ed.
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security principles and practice 4 th ed.
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Query modification based on relevance back propagation in an ad hoc environment, page 121
Author: M. Boughanem | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Microcomputers and their applications for developing countries: report of an ad hoc panel on the use of microcomputers for developing countries
Call Number: 338.926 Mic | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   8 9 10 11 12 13 14 15 16 17  Next