Search Result Save to File Save as CSV
Your search for 26644 returns 228 document(s)
Melindungi password dari serangan hacker, page 60
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
A Snapshot differential refresh algorithm (hal 53 - 60 )
Author: Bruce Lindsay, Laura Haas, C. Mohan, Hamid Pirahesh, & Paul Wilms; | Call Number: SEM-360 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
TCP/IP : running a successful network/ Washburn K.
Author: Washburn K.; | Call Number: 004.6 Was t | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Successful internal auditing to ISO 9000/Tom Taormina
Author: Taormina, Tom; | Call Number: 658.562 Tao s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Strategy paradox
Author: Dan Moyer | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Digital Strategy
Author: Muhammad Meisza; | Call Number: KP-2179 (Softcopy KP-1791) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Software test automation: effective use test execution tools
Author: Fewster, Mark; | Call Number: 005.14 Few s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Assembly Instruction Level Reverse Execution for Debugging, page 149-198
Author: T. Akgul, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
PA-RISC to IA-64: transparent execution, no recompilation, page 47
Author: Cindy Zheng | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient mid-query re-optimization of sub-optimization execution plans, Hal. 106-117
Author: Navin Kabra; David J. DeWitt; | Call Number: SEM-244 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next