Search Result
Save to File
Your search for
38164
returns
3489
document(s)
Pengembangan sistem informasi asrama next generation
Author: Dwi Priyanto; | Call Number: KP-1206 (Softkopi KP-769) | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Pengembangan sistem informasi asrama next generation
Author: Kukuh Kurniadi; | Call Number: KP-1181 (Softkopi KP-744) SCKP-408 | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Towards Next Generation Value Networks (813)
Author: York Sure; | Call Number: SEM-376 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Update on seed seed-192/256, (LNCS-Lecture Notes in Computer Science 5576) Hal. 1-10
Author: Kitae Jeong; Joongeun Choi; Yoseop Lee; Changhoon Lee; Jacchul Sung; Haeryong Park; Yeonjung Kang; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Adaptive iris segmentation, (LNCS-Lecture Notes in Computer Science 5576) Hal. 90-99
Author: Rahib Abiyev; Kemal Kilic; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Does it need trusted third party? design of buyyer-seller watermarking protocol without trusted third party, (LNCS-Lecture Notes in Computer Science 2576) Hal 265-279
Author: Jae-Gwi Choi; Kouichi Sakurai; Ji-Hwan Park; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Software engineer intern pada authentication & authorization team di PT Lingkar NIaga Solusindo (SIRCLO)
Author: Inez amandha suci; | Call Number: KP-3662 | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Authentication, Authorization, Detail Dokumen Utama,Dokumen Laporan, dan Dokumen Balasan pada Sistem Kearsipan Biro Psikologi InsanQ
Author: Farril Zavier Fernaldy; | Call Number: KP-3420 | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Data security through graphical authentication schemes, HAL. 1013-1024
Author: M.N. Djoja; Naveen Kumar; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer network security: theory and practice/ Jie Wang
Author: Wang Jie; | Call Number: 005.8 Wan c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
3
4
5
6
7
8
9
10
11
12
Next