Search Result Save to File Save as CSV
Your search for 14820 returns 4594 document(s)
Managing software security risks, page 99
Author: Gary M. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
The Trusted PC: skin-deep security, page 103
Author: Andrew B.W. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
What makes security technologies relevant?, page 38
Author: Li Gong | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Job security vs gaji, page 16
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Perubahan paradigma dari security menuju survivability, page 28
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Security of random data perturbation methods, page 487
Author: Muralidhar | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Manufacturing Practices and Strategy Integration: Effects on Cost Efficiency, Flexibility, and Market-Based Performance, page 427-458
Author: Morgan Swink, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Transformational technologies and the creation of new work practices: making implicit knowledge explicit in task-based offshoring, page 411-436
Author: Paul M. Leonardi and Diane E. Bailey | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Built to Learn: How Work Practices Affect Employee Learning During Healthcare Information Technology Implementation, Page 645-659
Author: Ariel Avgar, Prasanna Tambe, and Lorin M. Hitt | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Membangun strategi enterprise mobility, page 62
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   4 5 6 7 8 9 10 11 12 13  Next