Search Result Save to File Save as CSV
Your search for 40586 returns 7401 document(s)
Introduction to health information privacy and security 2nd ed.
Author: Rinehart-Thompson, Laurie A.; | Call Number: 610.68 Rin i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Applied cryptography: protocols, algorithms, and sources code in C
Author: Schmeier, Bruce; | Call Number: 005.82 Sch a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Internetworking with TCP/IP 2nd ed.
Author: Comer, Douglas; | Call Number: 004.6 Com i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Mathematica: a system for doing mathematics by computer 2nd ed.
Author: Wolfram, Stephen; | Call Number: 510.285 53 Wol s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Using informix-SQL 2nd ed./ Jonathan Leffler
Author: Leffler, Jonathan; | Call Number: 005.756 Lef u | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Applied statistics and the SAS programming language 2nd ed.
Author: Cody, Ronald P.; | Call Number: 519.5 Cod a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information processing systems 2nd ed.
Author: Davis, William S.; | Call Number: 004 Dav i | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Computer network 2nd ed.
Author: Tanenbaum, Andrew S.; | Call Number: 004.36 Tan c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer graphics 2nd ed.
Author: Hearn, Donald; | Call Number: 006.6 Hea c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer organization 2nd ed.
Author: Hamacher, V. Carl; | Call Number: 004.22 Ham c | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   6 7 8 9 10 11 12 13 14 15  Next