Your search for 46339 returns 5204 document(s) |
Introduction to algorithms |
Author: Cormen, Thomas H.; | Call Number: 005.1 Cor i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network optimization practice: a computational guide |
Author: Smith, David K.; | Call Number: 003.028 Smi n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Protection and security on the information superhighway |
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Designing security architecture solution |
Author: Ramachandran, Jay; | Call Number: 005.8 Ram d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer security : art and science |
Author: Bishop, Matt; | Call Number: 005.8 Bis c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer network |
Author: Black, Uyles D.; | Call Number: 004.6 Bla c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
IT auditing : using controls to protect iformation assets 2nd ed |
Author: Davis, Chris; | Call Number: 658.05 Dav i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information theory and network coding |
Author: Yeung, Raymond W.; | Call Number: 005.72 Yeu i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Introduction to the theory of complexity |
Author: Bovet, Daniel Piere; | Call Number: 511.3 Bov i | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An Introduction to information theory |
Author: Reza, Fazlollah M.; | Call Number: 003.54 Rez i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|