Search Result Save to File Save as CSV
Your search for 35507 returns 366 document(s)
Piecewise methods and applications to power systems/H.H. Happ
Author: Happ, H.H.; | Call Number: 621.392 Hap P | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Inductive Pebble Games and the Expressive Power of Datalog (301-310)
Author: V.S Lakshmanan A.O Mendelzon; | Call Number: SEM-379 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
On the Power of Rule-Based Languages with Sets (26-36)
Author: Kumar Vadaparty; | Call Number: SEM-350 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A transport-level proxy for secure multimedia streams, page 57
Author: King P.F. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Trus based instrusion detection scheme for secure data transfer, Hal. 651-658
Author: Mehfuz, Shabana; Doja, M.N.; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Trust based intrusion detection scheme for secure data transfer, HAL. 651-658
Author: Shabana Mehfuz and M.N. Doja; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Secure authentication system using two-factor authenticatin techniques, HAL. 1048-1054
Author: Supriya Raheja; supriya khaitan and mandeep Kaur; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A fast and secure encryption algorithm for message communication, HAL. 629- 634
Author: Paul A.J.; Varghess Paul, P. Mythili; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Information secure finger print analysis using wavelets, HAL. 638-641
Author: S. Ramapriya, S.K. Srivatsa; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
ITMS - a case study of a secure web application using OWSP guideline, Hal. 494-499
Author: Khairul Anwar Sedek, Mohd Nizam Osman, Nortis bt Osman; | Call Number: SEM-276 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   14 15 16 17 18 19 20 21 22 23  Next