Search Result Save to File Save as CSV
Your search for 44155 returns 975 document(s)
Analisis keamanan sistem perangkat lunak ( Hal 5 - 10 )
Author: ervin kusuma dewi, azhari SN; | Call Number: SEM - 365 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Fundamentals of business data communications 10 th ed.
Author: Fitzgerald, Jerry; | Call Number: 004.6 Fit f | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Business research methods 10 th ed
Author: Cooper, Donald R.; | Call Number: 658.007 2 Coo b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Belajar sendiri dalam 10 menit SQL/ Ben Forta
Author: Forta, Ben; | Call Number: 005.74 For B | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Clustering Dokumen dengan Metode Modifikasi teknik Hirarki (10)
Author: Susana Limanto; | Call Number: SEM-307 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Security monitoring
Author: Fry, Chris; | Call Number: 005.8 Fry s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computers & Security
Call Number: [2 (1983): 1-3, 3 (1884): 1-4, 4 (1984): 1-4) , 3 (1984): 1-4) , 4 (1985): 1-4 , 5 (1986): 1-3, 6 (1987): 3-6, 7 (1988): 1-3; 5-6, 7 (1988): 4; 10 (1990: 1, 9 (1990): 2-7] | Type: Jurnal/ Majalah
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security
Author: editors Virginia, Alexandria; | Call Number: 005.8 Com | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security
Author: Golddmann, Dieter; | Call Number: 005.8 Gol c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Security in computing
Author: Pfleeger, Charles P.; | Call Number: 005.8 Pfl s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next