Search Result Save to File Save as CSV
Your search for 36631 returns 3065 document(s)
A lattice based access control model, Hal. 3021-3025
Author: Mian Cai; Wenjie Yang; Wei Guo; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography and Data Security
Author: Denning, Dorothy E.; | Call Number: 005.8 Den c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Database security and integrity/ Eduardo B. Fernandez
Author: Fernandez, Eduardo B.; | Call Number: 005.74 Fer d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography: a primer
Author: Konheim, Alan G.; | Call Number: 526 Kon c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Handbook of CDMA system design, engineering, and optimization
Call Number: 621.384 5 Han | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Applications of CDMA in wireles/personal communications/Vijay K. Garg; Kenneth P. Smolit
Author: Garg, Vijay Kumar; | Call Number: 621.384 5 Gar a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Asynchronous transfer mode: solution for broadband ISDN 3rd ed.
Author: Prycker, Martin; | Call Number: 621.382 Pry a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Asynchronous tansfer mode: solution for broadband ISDN 2nd ed.
Author: Prycker, Martin; | Call Number: 621.382 Pry a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
IEEE - Software engineering standards collection/IEEE
Call Number: 005.1 IEE | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Hambatan berbagi pengetahuan pada proyek teknologi informasi dari aspek teknologi organisasi, dan individu: multi-kasus pada perusahaan teknologi informasi
Author: Aulia Damarreza; | Call Number: SK-1250 (Softcopy SK-732) | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   7 8 9 10 11 12 13 14 15 16  Next