Search Result Save to File Save as CSV
Your search for 6178 returns 2245 document(s)
Cryptography and Network security: principles and practice 4th ed.
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Applied regression analysis
Author: Draper, Norman R.; | Call Number: 519.536 Dra a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Introduction to fourier analysis and wavelets
Author: Pinsky Mark A.; | Call Number: 515.243 3 Pin i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Interval analysis/ Ramon E. Moore
Author: Moore, Ramon E; | Call Number: 511.42 Moo i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Systems analysis and design
Author: Kendall, Kenneth E.; | Call Number: 003 Ken s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Structured analysis and system specification
Author: DeMarco, Tom; | Call Number: 003 Dem s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Modern systems analysis and design
Author: Hoffer, Jeffrey; | Call Number: 005.12 Hof s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The design and analysis of computer algorithms
Author: Aho, Alfred V.; | Call Number: 511.8 Aho d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Vector and tensor analysis
Author: Lass, Harry; | Call Number: 515.63 Las v | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Vector and tensor analysis with applications
Author: Borisenko, A.I.; | Call Number: 515.63 Bor v | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   5 6 7 8 9 10 11 12 13 14  Next