Your search for 25231 returns 4581 document(s) |
Information systems analysis: with an introduction to fourth-generation technologies |
Author: Hall, Vicki J.; | Call Number: 658.403 2 Hal i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
New systems and services in telecommunications |
Author: antraine, G.; | Call Number: 384 New n | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Vector-based semantic analysis using random indexing for cross-lingual query expansion, (LNCS-Lecture Notes in Computer Science, 2406), 169-170 |
Author: Magnus Sahigren; Jussi Karigren; | Call Number: 025.04 Eva | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Benefits Analysis of IT Investment in Business Support System (BSS) Projects Using Ranti's Generic IS/IT Business Values: Case Studies of the Indonesian Telecommunication Company (331-336) |
Author: Dimas Agung Saputra
Widijanto Satyo Nugroho
Benny Ranti; | Call Number: SEM-371 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Validating a biometric authentication system: sample size requirements, page 1902 |
Author: S.C. Dass, Y. Zhu | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Return on investment (ROI) of a multilevel authentication design for acces control |
Author: Ford Lumban Gaol dan Belawati Widjaja | Call Number: JIKT-6-1-September2006-1 | Type: UI-ana Indek Artikel
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Java-based internet biometric authentication system, page 1166 |
Author: R.A.J. Everitt | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An Improved CRT-based broadcast authentication scheme in WSNs, hal. 47-50 |
Author: Yunjie Zhu, YuShen; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Converged PKI-Based Authorization,Authentication Management and Delegation for an E-Business |
Author: Mani Anand K.P,Narayanasamy P; | Call Number: SEM-305 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secure access/ Authentication module (SAM) di PT Reka Piranti Prakarsa |
Author: Hendra Marihot; | Call Number: KP-1055 (Softkopi KP-619) SCKP-401 | Type: Kerja Praktek (KP)
|
Find Similar |
Add To Favorites |
Detail in New Window
|