Your search for 39075 returns 1507 document(s) |
|
Author: Zheng Lin; Songho Tan; Xucqi Cheng; | Call Number: 025.04 Inf | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Element extraction and evaluation of packaging design using computational kensei engineering approach |
Author: Taufik Djatna; fajar munichputranto; nina hairiyah; elvira febriani; | Call Number: sem-320 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Rancangan Model Algoritma Pohlig-Hellman Dengan Menggunakan Multiple-key Berdasarkan Algoritma RSA Multiple-key,65-70 |
Author: Allwin Simarmata, Iryanto,Sutarman,M.Andri Budiman; | Call Number: SEM-342 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Prioritization Of Strateggic Guidelines As Part Of The Strategic Plan 2010-2024 for A Venezuelan University Using AHP (22) |
Author: Aidaelena Smith-Perera; | Call Number: SEM-311 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
CISSP Certification: exam guide all in one, 4th ed ; |
Author: Harris , Shon; | Call Number: 005.8 Har c; | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
CISSP certification exam guide/Shon Harris |
Author: Harris, Shon; | Call Number: 005.8 Har c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The CISSP prep guide: Gold edition /Ronald L. Krutz |
Author: Krutz, Ronald L.; | Call Number: 005.8 Kru c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The CISSP perp guide: mastering teh ten domains of computer security/ Ronald L. Krutz |
Author: Krutz, Ronald L.; | Call Number: 005.8 Kru c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information secure finger print analysis using wavelets, HAL. 638-641 |
Author: S. Ramapriya, S.K. Srivatsa; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Memetic evolutionary meta-heuristic attack on simplified data encyption standard algorithms |
Author: Poonam Garg; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|