Search Result Save to File Save as CSV
Your search for 45109 returns 3946 document(s)
Implementing elliptic curve cryptography/Michael Rosing
Author: Rosing, Michael; | Call Number: 005.82 Ros i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Executive guide to preventing information technology disasters/Richard Ennals
Author: Ennals, Richard; | Call Number: 658.478 Enn e | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information security management handbook 4th ed./ editor Harold F. Tiptop
Call Number: 658.055 8 Inf | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Internet & TCP/IP network security: securing protocols and applications/Uday I. Prabai, Vijay K. Garbani
Author: Pabrai, Uday I.; | Call Number: 005.8 Pab i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
PC hardware: The complete reference
Author: Zacker, Craig; | Call Number: 621.39 Zac p | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The Programmers's PL/I a complete reference
Author: Lecht, Charles Philip; | Call Number: 005.133 Lec p | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
C: the complete reference/Herbert Schildt
Author: Schildt, Herbert; | Call Number: 005.133 Sch c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Firewalls : the complete reference
Author: Strassberg, Keith E.; | Call Number: 005.8 Str f | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
PC hardware: The complete reference
Author: Zacker, Craig; | Call Number: 621.39 Zac p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Simulating computer systems: techniques and tools
Author: MacDougall, Myron H.; | Call Number: 003.3 Mac s | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   12 13 14 15 16 17 18 19 20 21  Next