Your search for 10387 returns 1347 document(s) |
Information warfare and security/Dorothy E. Denning |
Author: Denning, Dorothy E.R.; | Call Number: 355.343 Den i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
National security versus data privacy and security: study of personal data privacy and security in Iran, HAL. 1081-1087 |
Author: Hassan Allpour and Ebrahim Kiani Harchegant; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Aplikasi Neural Networks Untuk Prediksi Aliran Sungai (Studi Kasus DAS Cidanau, Indonesia dan DAS Terauchi, Jepang) (61-66) |
Author: Budi I. Setiawan
Rudiyanto; | Call Number: SEM-269 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Optimal resource allocation for muti-service networks, Hal. 33-41 |
Author: Robert Simon; Boris Jukic, Woan Sun Chang; | Call Number: SEM-260 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Pattern recognition and neural networks/B.D. Ripley |
Author: Ripley, D.; | Call Number: 006.4 Rip p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer networks and distributed processing, software techniques architecture |
Author: Martin, James; | Call Number: 004 Mar c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Strategi manajemen perubahan untuk mendukung implementasi information security management system : studi kasus Bank XYZ Divisi Teknologi Informasi |
Author: Farida Noorseptiyanti; | Call Number: KA-218 (Softcopy KA-217) | Edition: 2011 | Type: Karya Akhir (KA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Frequent episode rules using compressed frequent pattern data tree structure. hal, 65. |
Author: Rana Loda Tama, Souza Nurafrianto W.P, Alva Erwin, Harya Damar Widiputra; | Call Number: SEM-317 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Perencanaan tata kelola keamanan informasi berdasarkan information security management system (ISMS) ISO 27001 studi kasus Pusat Komunikasi Departemen Luar Negeri RI |
Author: Eko Ariefianto; | Call Number: PA-0086 (Softcopy PA-0086) | Edition: 2006 | Type: Proyek Akhir (PA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A source tree reliable multicast procotol for ad-hoc networks (STRM), Hal. 60-65 |
Author: T. Alahdal; S. Shamala; M. Othman; Z. Zukarnain; A. Alsaih; | Call Number: SEM-276 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|