Search Result Save to File Save as CSV
Your search for 46339 returns 5204 document(s)
Introduction to algorithms
Author: Cormen, Thomas H.; | Call Number: 005.1 Cor i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Network optimization practice: a computational guide
Author: Smith, David K.; | Call Number: 003.028 Smi n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Protection and security on the information superhighway
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Designing security architecture solution
Author: Ramachandran, Jay; | Call Number: 005.8 Ram d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security : art and science
Author: Bishop, Matt; | Call Number: 005.8 Bis c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer network
Author: Black, Uyles D.; | Call Number: 004.6 Bla c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
IT auditing : using controls to protect iformation assets 2nd ed
Author: Davis, Chris; | Call Number: 658.05 Dav i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information theory and network coding
Author: Yeung, Raymond W.; | Call Number: 005.72 Yeu i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Introduction to the theory of complexity
Author: Bovet, Daniel Piere; | Call Number: 511.3 Bov i | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
An Introduction to information theory
Author: Reza, Fazlollah M.; | Call Number: 003.54 Rez i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   7 8 9 10 11 12 13 14 15 16  Next