Search Result Save to File Save as CSV
Your search for 35669 returns 2450 document(s)
Penerapan CPM dalam sistem ICPR di PSPU, Hal. 215-218
Author: Ade Chandra Nugraha, Santi Sundari; | Call Number: SEM-268 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography and Data Security
Author: Denning, Dorothy E.; | Call Number: 005.8 Den c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
A Permutation Gigantic Issues in Mobile Real Time Distributed Database : Consistency & security (633-642)
Author: Gyanendra Kr. Gupta A.K. Sharma Vishnu Swaroop; | Call Number: SEM-323 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Memahami modul enkripsi dan security data/
Call Number: 005.8 Mem (MTI SLB) | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Principles of data security/ Ernst L. Leiss
Author: Leiss, Ernst L.; | Call Number: 05.8 Lei p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
National security versus data privacy and security: study of personal data privacy and security in Iran, HAL. 1081-1087
Author: Hassan Allpour and Ebrahim Kiani Harchegant; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Approach to ERP implementation, HAL. 989-994
Author: Atal Kumar Gang; Prashant Kumar; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Customizing materials management processes in SAP ERP operations
Author: Agrawal, Akash; | Call Number: 658.7 Agr c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
International conference on very large data bases, 4th Berlin, Sept. 13-15, 1978: Issues in data base management: procedings
Author: International conference on very large data bases, 4th Berlin, Sept. 13-15, 1978; | Call Number: 005.74 Int i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Security of random data perturbation methods, page 487
Author: Muralidhar | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next