Search Result
Save to File
Your search for
35611
returns
636
document(s)
Designing the mobile version of tera
Author: Christian Aryanda; | Call Number: KP-2377 | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Mobile application development di flipbox
Author: Tryviana Yusriska Sari; | Call Number: KP-2512 | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Pengembangan aplikasi mobile cermati
Author: Widyanto Bagus Priambodo; | Call Number: KP-2249 (Softcopy KP-1811) | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Pengembangan aplikasi mobile "citraland
Author: Aulia Rachmawan; | Call Number: KP-1814 (Softcopy KP-1276) | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Pengembangan Aplikasi Mobile UstadzBadr.
Author: Galih Andy Pradana; | Call Number: KP-1553 (Softcopy KP-1114) | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Cryptography: a new dimension in computer data security: a guide for the design and implementation of secure systems
Author: Meyer, Carl H.; | Call Number: 652.8 Mey c | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Secure wireles sensor network: solusi efisiensi sistem keamanan ubiquitous sensor network, HAL. 421-426
Author: Kholif Faiz Ma'ruf; Arif Rahman Hakim; | Call Number: SEM-292 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Analyzing the techniques to secure web database applications from SQL injectino attacks, HAL. 1349-1355
Author: Sushila Madan and Supriya Madan; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Secure smartcard-based fingerprint authentication using gabor filter and fuzzy vault, Hal. 442-446
Author: Rifki Sadikin, Esa Prakasa; | Call Number: SEM-276 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
A New strongly secure authenticated key exchange protocol, (LNCS-Lecture Notes in Computer Science 5576) Hal. 135-144
Author: Qingfeng Cheng; Chuangui Ma, and Xuexian Hu; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
2
3
4
5
6
7
8
9
10
11
Next