Search Result Save to File Save as CSV
Your search for 12345 returns 992 document(s)
Can vendors influence switching costs and compatibility in an environment with open standards?, page 541-562
Author: Pei-yu Chen and Chris Forman | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Can Public Participation Affect Local Government Development Policy? A Public Participation Model in Bandung City (618-633)
Author: Pratiwi Krismiyati; | Call Number: SEM-377 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Key management models: the 60+ models every manager needs to know 2nd ed.
Author: Assen, Marcel Van; | Call Number: 658.001 Ass k | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computers and your child: everything you need to know to guide your child through the computer age/ Ray Hammond
Author: Hammon, Ray; | Call Number: 004 Ham c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Implementasi fitur 'know your customer'- deteksi penipuan dan duplikasi data registrasi penyedia akomodasi pada pt traveloka
Author: Ahmad Hasan Siregar; | Call Number: KP-3216 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Uji lapangan dan pengukuran performance teknologi 1X EV-DO relsease 0 di Bandung, Hal. 296-300
Author: Eddy Setiawan; | Call Number: SEM-271 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Analisis Efek Pergerakan Hybrid Terminal User (1X/EV-DO) Pada Jaringan Overlay (hal 24-28)
Author: Sofia Naning H. Ir,. MT.; | Call Number: SEM-370 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Do Experts or Crowd-Based Models Produce More Bias? Evidence from Encyclopedia Britannica and Wikipedia, Page 945-959
Author: Shane Greenstein and Feng Zhu | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
When Do IT Security Investments Matter? Accounting for the Influence of Institutional Factors in the Context of Healthcare Data Breaches, Page 893-916
Author: Corey M. Angst, Emily S. Block, John D’Arcy, and Ken Kelley | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan modul online dalam game dayabaya do lab library and distance learning Fasilkom UI
Author: Eduar Napoleon; | Call Number: KP-1302 (Softcopy KP-861) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   12 13 14 15 16 17 18 19 20 21  Next