Search Result Save to File Save as CSV
Your search for 10387 returns 1347 document(s)
Information warfare and security/Dorothy E. Denning
Author: Denning, Dorothy E.R.; | Call Number: 355.343 Den i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
National security versus data privacy and security: study of personal data privacy and security in Iran, HAL. 1081-1087
Author: Hassan Allpour and Ebrahim Kiani Harchegant; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Aplikasi Neural Networks Untuk Prediksi Aliran Sungai (Studi Kasus DAS Cidanau, Indonesia dan DAS Terauchi, Jepang) (61-66)
Author: Budi I. Setiawan Rudiyanto; | Call Number: SEM-269 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Optimal resource allocation for muti-service networks, Hal. 33-41
Author: Robert Simon; Boris Jukic, Woan Sun Chang; | Call Number: SEM-260 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Pattern recognition and neural networks/B.D. Ripley
Author: Ripley, D.; | Call Number: 006.4 Rip p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer networks and distributed processing, software techniques architecture
Author: Martin, James; | Call Number: 004 Mar c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Strategi manajemen perubahan untuk mendukung implementasi information security management system : studi kasus Bank XYZ Divisi Teknologi Informasi
Author: Farida Noorseptiyanti; | Call Number: KA-218 (Softcopy KA-217) | Edition: 2011 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Frequent episode rules using compressed frequent pattern data tree structure. hal, 65.
Author: Rana Loda Tama, Souza Nurafrianto W.P, Alva Erwin, Harya Damar Widiputra; | Call Number: SEM-317 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Perencanaan tata kelola keamanan informasi berdasarkan information security management system (ISMS) ISO 27001 studi kasus Pusat Komunikasi Departemen Luar Negeri RI
Author: Eko Ariefianto; | Call Number: PA-0086 (Softcopy PA-0086) | Edition: 2006 | Type: Proyek Akhir (PA)
Find Similar |  Add To Favorites |  Detail in New Window 
A source tree reliable multicast procotol for ad-hoc networks (STRM), Hal. 60-65
Author: T. Alahdal; S. Shamala; M. Othman; Z. Zukarnain; A. Alsaih; | Call Number: SEM-276 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   13 14 15 16 17 18 19 20 21 22  Next