Search Result Save to File Save as CSV
Your search for 39075 returns 1507 document(s)
Author: Zheng Lin; Songho Tan; Xucqi Cheng; | Call Number: 025.04 Inf | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Element extraction and evaluation of packaging design using computational kensei engineering approach
Author: Taufik Djatna; fajar munichputranto; nina hairiyah; elvira febriani; | Call Number: sem-320 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Rancangan Model Algoritma Pohlig-Hellman Dengan Menggunakan Multiple-key Berdasarkan Algoritma RSA Multiple-key,65-70
Author: Allwin Simarmata, Iryanto,Sutarman,M.Andri Budiman; | Call Number: SEM-342 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prioritization Of Strateggic Guidelines As Part Of The Strategic Plan 2010-2024 for A Venezuelan University Using AHP (22)
Author: Aidaelena Smith-Perera; | Call Number: SEM-311 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
CISSP Certification: exam guide all in one, 4th ed ;
Author: Harris , Shon; | Call Number: 005.8 Har c; | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
CISSP certification exam guide/Shon Harris
Author: Harris, Shon; | Call Number: 005.8 Har c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The CISSP prep guide: Gold edition /Ronald L. Krutz
Author: Krutz, Ronald L.; | Call Number: 005.8 Kru c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The CISSP perp guide: mastering teh ten domains of computer security/ Ronald L. Krutz
Author: Krutz, Ronald L.; | Call Number: 005.8 Kru c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information secure finger print analysis using wavelets, HAL. 638-641
Author: S. Ramapriya, S.K. Srivatsa; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Memetic evolutionary meta-heuristic attack on simplified data encyption standard algorithms
Author: Poonam Garg; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next