Search Result Save to File Save as CSV
Your search for 41602 returns 4312 document(s)
Data model development for fire related extreme events: an activity theory approach, page 125-147
Author: Rui Chen, Raj Sharman, H.Raghav Rao, Shambhu J.Upadhyaya | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
How ethics can enhance organizational privacy: lessons from the choicePoint and TJX data breaches, page 673-687
Author: Mary J. Culnan and Cynthia Clark Williams | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Neural Correlates of Multidimensional Visualizations: An fMRI Comparison of Bubble and Three-Dimensional Surface Graphs Using Evolutionary Theory, Page 1097-1116
Author: Eric Walden, Gabriel S. Cogo, David J. Lucus, Elshan Moradiabadi, and Roozmehr Safi | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
How linux works: what every superuser should know 2nd ed.
Author: Ward, Brian; | Call Number: 005.432 War h | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Impeovement of UI GreenMetric: Why and How Sustrainability Indicators should be Impoved (104-111))
Author: Allan Lauder Nyoman Suwatha Riri Firti Sari; | Call Number: SEM-382 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Should you invest in the long tail?, page 88
Author: Anita Elberse | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
when should a process be art, not science?, page 58
Author: Joseph M. Hall and M. Eric Johnson | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Should you launch a fighter brand, page 86
Author: Mark Ritson | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Insiders’ Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors, page 1189-1210
Author: Clay Posey, Tom L. Roberts, Paul Benjamin Lowry, Rebecca J. Bennett, and James F. Courtney | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Breakthrough IT change management: how to get enduring change results
Author: Lientz Bennet P.; | Call Number: 658.403 8 Lie b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next