Search Result Save to File Save as CSV
Your search for 25347 returns 3920 document(s)
A key recovery mechanism for reliable group key management, (LNCS-Lecture Notes in Computer Science 2576) Hal 372-386
Author: Taenam Cho; Sang-Ho Lee; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Chip-based reconfigurable task management, (LNCS-Lecture Notes in Computer Science 2147) Hal 182-191
Author: Gordon Brebner; Oliver Diessel; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Hybrid control issues in air traffic management systems ( Invited presentation ), (LNCS-Lecture Notes in Computer Science 1201) Hal 108
Author: Shankar Sastry; | Call Number: 004.33 Mal h | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
The Active database management system manifesto: a rulebase of ADBMS features (LNCS-Lecture Notes in Computer Science 985) Hal. 1-17
Author: Klaus R. Dittrich, Stella Gatziu, Andreas Geppert; | Call Number: 004 Rul | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Management information systems: a study of computer-based information systems sixth edition/Raymond McLeod
Author: McLeod, Raymond; | Call Number: 658.403 8 Mcl m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Software maintenance management: a stury of the maintenance of computer application software in 487 data processing organization
Author: Lientz, Bennet P.; | Call Number: 005.133 Lie s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Pemanfaatan computer forensic pada kegiatan fraud risk management: studi kasus instansi pemerintah XYZ
Author: Andri Rivano; | Call Number: KA-733 (Softcopi KA-731) MAK KA-390 | Edition: 2015 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan tata kelola keamanan informasi berdasarkan information security management system (ISMS) ISO/IEC 27001:2005 untuk pengelolaan data migas yang di kelola oleh pihak ketiga: studi kasus pusat data dan teknologi informasi energi dan sumber daya mineral
Author: Dian Ikasari; | Call Number: KA-682 (Softcopy KA-680) MAK KA-341 | Edition: 2015 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Information security architecture: an integrated approach to security in the organization 2nd ed.
Author: Killmeyer, Jan; | Call Number: 005.8 Kil i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Memahami modul enkripsi dan security data/
Call Number: 005.8 Mem (MTI SLB) | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   8 9 10 11 12 13 14 15 16 17  Next