Search Result
Save to File
Your search for
972
returns
2434
document(s)
Cryptography and network security: principles and practice 3rd ed.
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Summary of the system development methodology
Call Number: 003 Sum | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Practical queueing analysis/Mike Tanner
Author: Tanner, Mike; | Call Number: 519.82 Tan p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
System modeling and simulation: an introduction/ Frank L. Severance
Author: Severance, Frank L.; | Call Number: 003.3 Sev b | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Learning for action: a short definitive account of sosft systems methodology and its use for practitioners teachers and students
Author: Checckland, Peter; | Call Number: 658.403 2 Che l | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Systems thinking systems practice: soft systems methodology: a 30 year retrospective
Author: Checkland, Peter; | Call Number: 003 Che s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Foundations of coding: compression encryption error correction
Author: Dumas, Jean-Guillaume; | Call Number: 003.54 Dum f | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Introduction to process algebra
Author: Fokkink, Wan; | Call Number: 004 Fok i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Elementary number tehory cryptography and codes
Author: Baldoni, M.W.; | Call Number: 512.72 Bal e | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Control and coordination in hierachical systems/ W. Findeisen
Author: Findeisen , W.; | Call Number: 003 Con c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
13
14
15
16
17
18
19
20
21
22
Next