Search Result Save to File Save as CSV
Your search for 14895 returns 3781 document(s)
Gamers Jump into broadband technology* intel has new chip design for handelds* patent expiration begins new encryption era, page 16
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Effective vs efficient computing
Call Number: 004 Eff | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Qualitative vs quantitative cartography
Author: Fisher, Howard T.; | Call Number: 526 Fis q | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Sistem informasi kepegawaian dan gaji PT X
Author: Yenni Rahmawati; | Call Number: KP-0754 (Softkopi KP-320) SCKP-193 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Meaningful Healthcare Security: Does Meaningful-Use Attestation Improve Information Security Performance?, Page 1043-1067
Author: Juhee Kwon and M. Eric Johnson | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
SAFKASI: A Security Mechanism for Language-Based Systems, page 341-378
Author: Dan S. Wallach, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Digital government security infrastructure design challenges, page 66
Author: James Joshi | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Trust-based security in pervasive computing environments, page 154
Author: Lalana Kagal | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Wanted: more network-security graduates and research, page 22
Author: Linda Dailey P. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Technology standards pros aid homeland security, page 104
Author: Kate M. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   2 3 4 5 6 7 8 9 10 11  Next