Search Result
Save to File
Your search for
6178
returns
2245
document(s)
Cryptography and Network security: principles and practice 4th ed.
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Applied regression analysis
Author: Draper, Norman R.; | Call Number: 519.536 Dra a | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Introduction to fourier analysis and wavelets
Author: Pinsky Mark A.; | Call Number: 515.243 3 Pin i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Interval analysis/ Ramon E. Moore
Author: Moore, Ramon E; | Call Number: 511.42 Moo i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Systems analysis and design
Author: Kendall, Kenneth E.; | Call Number: 003 Ken s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Structured analysis and system specification
Author: DeMarco, Tom; | Call Number: 003 Dem s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Modern systems analysis and design
Author: Hoffer, Jeffrey; | Call Number: 005.12 Hof s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
The design and analysis of computer algorithms
Author: Aho, Alfred V.; | Call Number: 511.8 Aho d | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Vector and tensor analysis
Author: Lass, Harry; | Call Number: 515.63 Las v | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Vector and tensor analysis with applications
Author: Borisenko, A.I.; | Call Number: 515.63 Bor v | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
5
6
7
8
9
10
11
12
13
14
Next