Your search for 26644 returns 228 document(s) |
Melindungi password dari serangan hacker, page 60 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Snapshot differential refresh algorithm (hal 53 - 60 ) |
Author: Bruce Lindsay, Laura Haas, C. Mohan, Hamid Pirahesh, & Paul Wilms; | Call Number: SEM-360 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
TCP/IP : running a successful network/ Washburn K. |
Author: Washburn K.; | Call Number: 004.6 Was t | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Successful internal auditing to ISO 9000/Tom Taormina |
Author: Taormina, Tom; | Call Number: 658.562 Tao s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Strategy paradox |
Author: Dan Moyer | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Digital Strategy |
Author: Muhammad Meisza; | Call Number: KP-2179 (Softcopy KP-1791) | Type: Kerja Praktek (KP)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Software test automation: effective use test execution tools |
Author: Fewster, Mark; | Call Number: 005.14 Few s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Assembly Instruction Level Reverse Execution for Debugging, page 149-198 |
Author: T. Akgul, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
PA-RISC to IA-64: transparent execution, no recompilation, page 47 |
Author: Cindy Zheng | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Efficient mid-query re-optimization of sub-optimization execution plans, Hal. 106-117 |
Author: Navin Kabra; David J. DeWitt; | Call Number: SEM-244 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|