Your search for 32602 returns 715 document(s) |
The use of microprocessors/ Michael Aumiaux |
Author: Aumiaux. Michael; | Call Number: 004.16 Aum u | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Use cases patterns and blueprints |
Author: Overgaard, Gunnar; | Call Number: 005.1 Ove u | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Making home automation communications secure, page 50 |
Author: Peter B. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Building the IBM 4758 secure coprocessor, page 57 |
Author: Joan G. Dyer | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secure PHP development: building 50 pratical applications |
Author: Kabir, Mohammed J.; | Call Number: 005.276 Kab s | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Taxonomy for secure object-oriented database, page 3 |
Author: Olivier, Martin S. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Crypto-ON: solusi protokol untuk secure ubiquitus e-voting, HAL. 169-274 |
Author: Esti Rahmawati Agustina; Panji Yudha Prakasa; | Call Number: SEM-292 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secure remote power peralatan elektronis, HAL. 415-420 |
Author: Panji Yudha Prakasa; Syamsi Nurdiansah, Fajar Restosa Pratama; | Call Number: SEM-292 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Congestion control in secure multiparty computation, HAL.902-909 |
Author: Zulfa Shaikh and Manta Sakpal; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Multimodal biometric systems: a way to secure authentication, HAL. 765-771 |
Author: Divyakast T. Meva; R.P. Sangkhan; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|