Search Result Save to File Save as CSV
Your search for 46264 returns 7320 document(s)
Maximum linux security: a hacker's guide to protecting your linux server and workstation
Author: Anonymous; | Call Number: 005.43 Ano m | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Techniques and applications of digital watermarking and content protection
Author: Arnold, Michael; | Call Number: 005.8 Arn t | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Digital watermarking and steganography
Author: Cox, Ingemar J.; | Call Number: 005.8 Cox d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Elliptic curves in cryptography
Author: Blacke, Ian F.; | Call Number: 005.82 Bla c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer organization: hardware/software 2nd ed./ George W. Gorline
Author: Gorsline, George W.; | Call Number: 004 Gor c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Java How to Program 2nd ed
Author: Deitel, H.M.; | Call Number: 005.133 Dei j | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Digital certificates: applied internet security
Author: Feghhi, Jalal; | Call Number: 005.8 Feg d | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Digital certificates: applied internet security
Author: Feghhi, Jalal; | Call Number: 005.8 Feg d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
IPSec: the new security standard for the internet, intranets, and virtual private networks/Naganand Doraswarry; Dan Harkins
Author: Doraswary, Naganand; | Call Number: 005.8 Dor i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The Unified modeling language reference manual 2nd ed.
Author: Rumbaugh, James; | Call Number: 005.3 Rum u | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   21 22 23 24 25 26 27 28 29 30  Next