Search Result Save to File Save as CSV
Your search for 14895 returns 3785 document(s)
The 15th annual international symposium on computer architecture: computer architecture news volume 16, no. 2 May 30-June2, 1988 Honolulu, Hawaii
Call Number: SEM-113 | Type: Prosiding Seminar
Find Similar |  Add To Favorites |  Detail in New Window 
Pengenalan aroma baru yang tidak diketahui (UNKNOWN) 2 campuran dan 3 campuran 16 sensor dengan menggunakan FLVQ dan analisa matriks similatiras/ Komara Hidayat
Author: Komara Hidayat; | Call Number: SK-0498 | Edition: Benyamin Kusumoputro | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan Automated Security Scanner dan Deployment Private Cloud di Lab Security FASILKOM UI (Center for Cyber Security and Cryptography, Universitas Indonesia)
Author: Gregorius Aprisunnea; | Call Number: KP-3382 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan Automated Security Scanner dan Deployment Sistem Manajemen Pivate Cloud di Lab Security FASILKOM UI (Center for Cyber Security and Cyrptography, Universitas Indonesia)
Author: Steven Kusuman; | Call Number: KP-3343 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Practical unix security/Simson Garfinkel and Gene Spafford
Author: Garfinkel, Simson; | Call Number: 005.8 Gar p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Network security essentials applications and standards 2nd ed.
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Security and Privacy Issues of Handheld and Wearable Wireless Devices
Author: Roberto Di Pietro, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Using the common criteria for it security evaluation/ Debra S. Hermann
Author: Hermann, Debra S.; | Call Number: 005.8 Her s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
A Practical guide to security assessments/ Sudhanshu Kairab
Author: Kairab, Sudhanshu; | Call Number: 658.478 Kai p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
ATM control, audit and security/ Chester M. WInters
Author: Winters, Chester M.; | Call Number: 005.8 Win a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   20 21 22 23 24 25 26 27 28 29  Next