Your search for 6809 returns 5926 document(s) |
Computer Fraud & Security Bulletin |
Call Number: [6 (1983): 1,2,4-12, 6 (1984): 6, 7 (1984): 1-12, 8 (1985): 1-9,12, 9 (1986): 1-12, 10 (1987): 1-3, 10 (1987): 1-3] | Type: Jurnal/ Majalah
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer Security Journal |
Call Number: 11 (1983): 1 | Type: Jurnal/ Majalah
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Pengembangan router security policy dengan mengevaluasi screening router study kasus : last mile internet provider |
Author: Ferdi S.Tasik; | Call Number: T-0383 (Softcopy T-0022) | Edition: 2003 | Type: Tesis
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network routing: algorithms, protocols, and architectures |
Author: Medhi, Deepanker; | Call Number: 004.6 Med n | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network routing: algorithms, protocols, and architectures |
Author: Medhi, Deepanker; | Call Number: 004.6 Med n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network application framework: design and arhictecture |
Author: Grenberg, Eric; | Call Number: 004.6 Gre n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
User accounting system of centralized computer networks using RADIUS protocol (hal 457 - 462) |
Author: Heru Nurwarsito, Raden Arief Setyawan, Handoko D Fatikno; | Call Number: SEM - 362 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Java network programming |
Author: Hughes, Merlin; | Call Number: 005.276 Hug j | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Java network programming |
Author: Hughes, Merlin; | Call Number: 005.276 Hag j | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Neural network:A Comprehensive Foundation |
Author: Haykin, Simon; | Call Number: 006.32 Hay n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|