Search Result Save to File Save as CSV
Your search for 29279 returns 4937 document(s)
CyBOK: The Cyber Security Body of Knowledge version 1.0
Call Number: 005.8 Cyb | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Pengenalan objek 3 dimensi menggunakan jaringan syarat tiruan dengan arsitektur spheric structure of hidden layer/Bayu Adianto Prabowo
Author: Bayu Adianto Prabowo; | Call Number: SK-0558(Softcopy SK-41) | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Analisa perencenaan implementasi jaringan nirkabel di fak. Ilmu Komputer Universitas Indonesia/ Mirta Amalia
Author: Mirta Amalia; | Call Number: SK-0561(Softcopy SK- 44) | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan sharable e-learning content authoring tool and repository (SHECAR)
Author: Eko Sulistyo; Kukuh Setiadi; Purniawan; | Call Number: SP-136 (Softkopi SP-77) SCSP-59 | Type: Student Project (SP)
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan implementasi sistem keamanan jaringan berbasis VPN pada sebuah perusahaan studi kasus: PT DANAREKSA
Author: Riska Adriyani; | Call Number: T-0326 (Softcopy T-0148) | Edition: 2002 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Penggunaan Media Publik Internet Sebagai VIRTUAL PRIVATE NETWORK (VPN)
Author: Bill Fridini; | Call Number: T-0117 | Edition: 1998 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Penerapan Collaborative Learning dalam proses pengajaran
Author: Andreas Irwan Gani; | Call Number: T-0223 | Edition: 2001 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Data Communications And Computer Networks A Business User's Approach
Author: West, Jill White, Curt M.; | Call Number: 004.6 Wes D | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Network security principles and practices: expert solutions for securing network infrastructures and VPNs/ Saadat Malik
Author: Malik Saadat; | Call Number: 005. 8 Mal n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer network security: second internaitonal workshop on mathematical methods, models and architectures for computer network security MMM-ACNS 2003 St Petersburg, Russia, Sept' 2003, Proceeding
Call Number: 005.8 Com | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   17 18 19 20 21 22 23 24 25 26  Next