Your search for 32602 returns 715 document(s) |
Penerapan item response theory yang dikominasikan dengan kingsbury and zara procedure pada adaptive test system/ Inge Evita Putri |
Author: Inge Evita Putri; | Call Number: SK-0587(Softcopy SK-65) Source Code SK-10 | Type: Skripsi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analisis dan pengelolaan standrad operational procedure (SOP) pada divisi sarana teknologi dan sistem informasi Fakultas Ilmu Komputer Universitas Indonesia |
Author: Roy Mario Fransiskus Klau; | Call Number: KP-2252 (Softcopy KP-1814) | Type: Kerja Praktek (KP)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analisis dan pengelolaan standard operational procedure (SOP) di PT Supra Primatama Nusantara (Biznet Networks) |
Author: Siti Nurvianingrum; | Call Number: KP-2229 (Softcopy KP-1791) | Type: Kerja Praktek (KP)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A transport-level proxy for secure multimedia streams, page 57 |
Author: King P.F. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Trus based instrusion detection scheme for secure data transfer, Hal. 651-658 |
Author: Mehfuz, Shabana; Doja, M.N.; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Trust based intrusion detection scheme for secure data transfer, HAL. 651-658 |
Author: Shabana Mehfuz and M.N. Doja; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secure authentication system using two-factor authenticatin techniques, HAL. 1048-1054 |
Author: Supriya Raheja; supriya khaitan and mandeep Kaur; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A fast and secure encryption algorithm for message communication, HAL. 629- 634 |
Author: Paul A.J.; Varghess Paul, P. Mythili; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information secure finger print analysis using wavelets, HAL. 638-641 |
Author: S. Ramapriya, S.K. Srivatsa; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
ITMS - a case study of a secure web application using OWSP guideline, Hal. 494-499 |
Author: Khairul Anwar Sedek, Mohd Nizam Osman, Nortis bt Osman; | Call Number: SEM-276 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|