Search Result Save to File Save as CSV
Your search for 38164 returns 3489 document(s)
Pengembangan sistem informasi asrama next generation
Author: Dwi Priyanto; | Call Number: KP-1206 (Softkopi KP-769) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan sistem informasi asrama next generation
Author: Kukuh Kurniadi; | Call Number: KP-1181 (Softkopi KP-744) SCKP-408 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Towards Next Generation Value Networks (813)
Author: York Sure; | Call Number: SEM-376 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Update on seed seed-192/256, (LNCS-Lecture Notes in Computer Science 5576) Hal. 1-10
Author: Kitae Jeong; Joongeun Choi; Yoseop Lee; Changhoon Lee; Jacchul Sung; Haeryong Park; Yeonjung Kang; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Adaptive iris segmentation, (LNCS-Lecture Notes in Computer Science 5576) Hal. 90-99
Author: Rahib Abiyev; Kemal Kilic; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Does it need trusted third party? design of buyyer-seller watermarking protocol without trusted third party, (LNCS-Lecture Notes in Computer Science 2576) Hal 265-279
Author: Jae-Gwi Choi; Kouichi Sakurai; Ji-Hwan Park; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Software engineer intern pada authentication & authorization team di PT Lingkar NIaga Solusindo (SIRCLO)
Author: Inez amandha suci; | Call Number: KP-3662 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Authentication, Authorization, Detail Dokumen Utama,Dokumen Laporan, dan Dokumen Balasan pada Sistem Kearsipan Biro Psikologi InsanQ
Author: Farril Zavier Fernaldy; | Call Number: KP-3420 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Data security through graphical authentication schemes, HAL. 1013-1024
Author: M.N. Djoja; Naveen Kumar; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Computer network security: theory and practice/ Jie Wang
Author: Wang Jie; | Call Number: 005.8 Wan c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   3 4 5 6 7 8 9 10 11 12  Next