Search Result Save to File Save as CSV
Your search for 5574 returns 4375 document(s)
Network application framework: design and arhictecture
Author: Grenberg, Eric; | Call Number: 004.6 Gre n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The cydades computer network/ edited by L. Pouzen
Author: Fouzin, L.; | Call Number: 004.6 | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Java network programming
Author: Hughes, Merlin; | Call Number: 005.276 Hug j | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Java network programming
Author: Hughes, Merlin; | Call Number: 005.276 Hag j | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Pro performancePoint server 2007 building business intelligence solutions
Author: Philo Janus; | Call Number: 658.500 28 Pro | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information security management : Concepts and Practice
Author: Raggad, Bel G.; | Call Number: 005.8 Rag i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The Shellcoder's handbook: discovering and exploiting security holes 2nd ed.
Call Number: 005.8 She | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The Basics of information security: understanding the fundamentals of infosec in theory and practice 2nd ed.
Author: Andress, Jason; | Call Number: 005.8 And b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security basics/editor Deborah Russell and G.T. Gangemi S.R.
Call Number: 005.8 Com | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Neural network:A Comprehensive Foundation
Author: Haykin, Simon; | Call Number: 006.32 Hay n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   8 9 10 11 12 13 14 15 16 17  Next