Search Result Save to File Save as CSV
Your search for 40159 returns 1664 document(s)
Foiling the system breakers
Author: Lobel, Jerome; | Call Number: 005.8 Lob f | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Managing information security: a program for the electronic information age
Author: Schweitzer, James A.; | Call Number: 658.478 Sch m | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Managing information security: a program for the electronic information age/ James A. Schweitzer
Author: Schweitzer, James A.; | Call Number: 658.478 Sch m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security management/ Donn B. Parker
Author: Parker, Donn B.; | Call Number: 658.478 Par c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Simulasi mesin turing dengan mesin pangakses acak menggunakan blok memori
Author: Judhi Santoso; | Call Number: T-0054 | Edition: 1990 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Penyimpanan stabil
Author: Syukri Yunus; | Call Number: T-0015 | Edition: 1991 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Improving recognition and generalization capability of back-propagation NN using a self-organized network inspired by immune algorithm(SONIA)/ Muhammad R. Widyanto
Author: Widyanto, M. Rahmat; Nobuhara, Hajime; Kawamoto, Kazuhiko; Hirota, Kaoru; Kusumoputro, Benyamin | Call Number: Pub.Staf JI-0005 | Type: Jurnal Internasional
Find Similar |  Add To Favorites |  Detail in New Window 
Internet broadband via kabel listrik, page 78
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Dengan broadband mengincar pasar korporasi, page 58
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Malaysia perluas penetrasi broadband, page 90
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   12 13 14 15 16 17 18 19 20 21  Next