Search Result
Save to File
Your search for
40310
returns
528
document(s)
Telecommunication networks: protocols, modeling and analysis/ Mischa Schwartz
Author: Schwartz, Mischa; | Call Number: 004.6 Sch t | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
TCP/IP and related protocols/Uyless Black
Author: Black, Uyless D.; | Call Number: 004.62 Bla t | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Reviewing Amenesia Support in Dtabase Recovery Protocols (717-734)
Author: Ruben de Juan-Marin Luis H.Garcia-Munoz J.Enrique Armendariz-Inigo Francesc D.Munoz-Escon; | Call Number: SEM-376 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
A Method and Protocols for E-payment in E-commerce (V1-138 -- V1-142)
Author: Shijin Yuan Bin Mu; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Network security essentials applications and standards 2nd ed.
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Building a global information assurance program/ Raymond J. Curts
Author: Curts, Raymond J.; | Call Number: 005.8 Cur b | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Studi perencanaan manajemen proteksi keamanan internet banking
Author: Alfian Noor; | Call Number: PA-0029 (Softcopy PA-0029 | Edition: 2005 | Type: Proyek Akhir (PA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Analisa dan Kajian Kebijakan Keamanan, sebuah studi kasus Sistem E-learning pada Universitas BCD
Author: Rony Baskoro Lukito; | Call Number: PA-0058 (Softcopy PA-0058) | Edition: 2005 | Type: Proyek Akhir (PA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Perancangan kebijakan keamanan yang efectif dalam menghadapi ancaman internal studi kasus President University
Author: Sasongko Budhi W.; | Call Number: PA-0073 (Softcopy PA-073) | Edition: 2005 | Type: Proyek Akhir (PA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer network security: theory and practice/ Jie Wang
Author: Wang Jie; | Call Number: 005.8 Wan c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
18
19
20
21
22
23
24
25
26
27
Next