Search Result
Save to File
Your search for
43005
returns
3640
document(s)
The Shellcoder's handbook: discovering and exploiting security holes 2nd ed.
Call Number: 005.8 She | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Managing risk in information systems
Author: Gibson, Darril; | Call Number: 005.8 Gib m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Corporate computer security 4th ed.
Author: Boyle, Randall J.; | Call Number: 005.8 Boy c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Managing risk in information systems 2nd ed.
Author: Gibson, Darril; | Call Number: 005.8 Gib m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer security principles and practice 4 th ed.
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
A Hands-on introduction to data science
Author: Shah, Chirag; | Call Number: 004 Sha h | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer systems: a programmers' persepctive 2nd ed.
Author: Bryant, Randal E.; | Call Number: 004.21 Bry c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer organization and embedded systems 6th ed.
Author: Hamacher, Carl; | Call Number: 004.22 Ham c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer organization 5th ed.
Author: Hamacher, Carl; | Call Number: 004.22 Ham c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer organization
Author: Hamacher, V.; | Call Number: 004.22 Ham c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
28
29
30
31
32
33
34
35
36
37
Next