Search Result Save to File Save as CSV
Your search for 40310 returns 528 document(s)
Telecommunication networks: protocols, modeling and analysis/ Mischa Schwartz
Author: Schwartz, Mischa; | Call Number: 004.6 Sch t | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
TCP/IP and related protocols/Uyless Black
Author: Black, Uyless D.; | Call Number: 004.62 Bla t | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Reviewing Amenesia Support in Dtabase Recovery Protocols (717-734)
Author: Ruben de Juan-Marin Luis H.Garcia-Munoz J.Enrique Armendariz-Inigo Francesc D.Munoz-Escon; | Call Number: SEM-376 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Method and Protocols for E-payment in E-commerce (V1-138 -- V1-142)
Author: Shijin Yuan Bin Mu; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Network security essentials applications and standards 2nd ed.
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Building a global information assurance program/ Raymond J. Curts
Author: Curts, Raymond J.; | Call Number: 005.8 Cur b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Studi perencanaan manajemen proteksi keamanan internet banking
Author: Alfian Noor; | Call Number: PA-0029 (Softcopy PA-0029 | Edition: 2005 | Type: Proyek Akhir (PA)
Find Similar |  Add To Favorites |  Detail in New Window 
Analisa dan Kajian Kebijakan Keamanan, sebuah studi kasus Sistem E-learning pada Universitas BCD
Author: Rony Baskoro Lukito; | Call Number: PA-0058 (Softcopy PA-0058) | Edition: 2005 | Type: Proyek Akhir (PA)
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan kebijakan keamanan yang efectif dalam menghadapi ancaman internal studi kasus President University
Author: Sasongko Budhi W.; | Call Number: PA-0073 (Softcopy PA-073) | Edition: 2005 | Type: Proyek Akhir (PA)
Find Similar |  Add To Favorites |  Detail in New Window 
Computer network security: theory and practice/ Jie Wang
Author: Wang Jie; | Call Number: 005.8 Wan c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   18 19 20 21 22 23 24 25 26 27  Next