Your search for 13907 returns 3506 document(s) |
National information infrastructure initiatives: visions and policy design, edited by B. Kahim and E. Wilson, page 383 |
Author: Robert C. Ward | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The secrets to successful strategy execution, 60 |
Author: Gary L. Neilson, Karla L. Martin and Elizabeth Powers | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
IT Infrastructure architecture: infrastructure building blocks and concepts |
Author: Laan, Sjaak; | Call Number: 658.72 Laa i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Snapshot differential refresh algorithm (hal 53 - 60 ) |
Author: Bruce Lindsay, Laura Haas, C. Mohan, Hamid Pirahesh, & Paul Wilms; | Call Number: SEM-360 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Low-resource authentication with dragon, 266-270 |
Author: Matt Henricksen; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cyber attacks protecting national infrastructure |
Author: Amoroso, Edward G.; | Call Number: 363.3 Amo c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Bluetooth-Based JXME Infrastructure (667-682) |
Author: Carlo Blundo
Emiliano De Cristofano; | Call Number: SEM-376 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Halal Global Analytic Hierarchy Parameters: A Conceptual Assessment (60) |
Author: Rohana Kamaruddin
Hadijah Iberahim
Norlida Abdul Hamid
Rahana Abdul Rahman
Nurol Ain Mustapha; | Call Number: SEM-311 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Data security through graphical authentication schemes, HAL. 1013-1024 |
Author: M.N. Djoja; Naveen Kumar; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Multimodal biometric systems: a way to secure authentication, HAL. 765-771 |
Author: Divyakast T. Meva; R.P. Sangkhan; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|