Your search for 52928 returns 1872 document(s) |
Building an Overlay for Wireless Mesh Network |
Author: Santika W.P, M. Ghifary, Adi Indrayanto, Iping Supriana; | Call Number: SEM-368 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Building simulation models with SIMCRIPT II.5 |
Author: Russel, Edward E.; | Call Number: 003.351 3 Rus b | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Building J2EE aplications with IBM websphere |
Author: Nilsson, Dale R.; | Call Number: 005.133 Nil b | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Building the data warehouse 4th ed. |
Author: Inmon, William H.; | Call Number: 658.403 8 Inm b | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Building java enterprise systems with J2EE |
Author: Perrone, Paul J.; | Call Number: 005.133 Per b | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Building internet firewalls 2nd ed. |
Author: Zwicky, Elizabeth D.; | Call Number: 005.8 Zwi b | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Building effective decision support systems |
Author: Sprague, Ralph H.; | Call Number: 658.403 Spr b | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Data mining: building competitive advantage |
Author: Groth, Robert; | Call Number: 658.403 8 Gro d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Building Reusable Mobile Agents (1-6) |
Author: Ichiro Satoh; | Call Number: SEM-306 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Adam D. Moore (Ed), information ethics, privacy, property and power, university of wshington Press, 2005 , 455 pp, ISBN: 0-29598489-9, paper $30.00, page 854 |
Author: Judith Wagner D. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|