Your search for 45109 returns 3946 document(s) |
Implementing elliptic curve cryptography/Michael Rosing |
Author: Rosing, Michael; | Call Number: 005.82 Ros i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Executive guide to preventing information technology disasters/Richard Ennals |
Author: Ennals, Richard; | Call Number: 658.478 Enn e | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information security management handbook 4th ed./ editor Harold F. Tiptop |
Call Number: 658.055 8 Inf | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Internet & TCP/IP network security: securing protocols and applications/Uday I. Prabai, Vijay K. Garbani |
Author: Pabrai, Uday I.; | Call Number: 005.8 Pab i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
PC hardware: The complete reference |
Author: Zacker, Craig; | Call Number: 621.39 Zac p | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Programmers's PL/I a complete reference |
Author: Lecht, Charles Philip; | Call Number: 005.133 Lec p | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
C: the complete reference/Herbert Schildt |
Author: Schildt, Herbert; | Call Number: 005.133 Sch c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Firewalls : the complete reference |
Author: Strassberg, Keith E.; | Call Number: 005.8 Str f | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
PC hardware: The complete reference |
Author: Zacker, Craig; | Call Number: 621.39 Zac p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Simulating computer systems: techniques and tools |
Author: MacDougall, Myron H.; | Call Number: 003.3 Mac s | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|