Your search for 12441 returns 225 document(s) |
Bridge Teaching Table: A Tool To Support Bridge Guided Collaborative Learning (227-231) |
Author: Roberto Moriyon; | Call Number: SEM-330 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Social Learning: Defining Learning Objects From Social Tool (101-108) |
Author: Andre Luis Andrade Menolli
Sheila Reinehr
Andreia Malucelli; | Call Number: SEM-329 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Usatasker: A Task Definition Tool For Supporting The Usability Evaluation Of Web Applications (307-314) |
Author: Leandro Guarino de Vasconceles
Laercio Augusto Baldochi Jr.; | Call Number: SEM-329 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On The Use Of Social Media For Important Things: Facebook As A Coping Tool (431-435) |
Author: Felix S. Hussenoeder; | Call Number: SEM-329 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Data mining cookbook modeling data for marketing, risk, and customer relationship management |
Author: Rud, Olivia Parr; | Call Number: 006.33 Rud d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Correlated failures, diversification, and information security risk management, page 397-422 |
Author: Pei-yu Chen, Gaurav Kataria, and Ramayya Krishnan | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The six mistakes executives make in risk management, page 78 |
Author: Nassim N. Taleb, Daniel G. Goldstein, and Mark W. Spitznagel | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Selecting useful features for personal credit risk management, HAL. 913-920 |
Author: Li Shukai and Narendra S. Chaudhari; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Software effort estimation and risk analysis a case study, HAL. 1002- 1007 |
Author: Mala V. Patil; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Computer incident response planning handbook: Executable plans for protecting information at risk |
Author: McCarthy, N.K.; | Call Number: 005.8 Mcc c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|