Your search for 41877 returns 5957 document(s) |
Algorithms-structured computer arrays and networks: architectures and processors for images percepts, models, information/ Leonard Uhr |
Author: Uhr, Leonard; | Call Number: 004.35 Uhr a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Metadata solutions: using meta models-repositories, xml, and enterprise portals to generate information on demand |
Author: Tannembaum, Andrienne; | Call Number: 005.7 Tan m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Training for information assurance, page 30 |
Author: Donald Welch | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The evolution of information assurance, page 65 |
Author: Roger C. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Opportunities for information visualization, page 22 |
Author: Jock D.M. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Survey on information appliances, page 24 |
Author: Roy Want | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On contexts of information seeking, page 735 |
Author: J. David J. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Interactive analysis of computer crimes, page 69 |
Author: Donald E. Brown | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Windows of vulnerability: a case study analysis, page 52 |
Author: William A.A. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Key exchange in Ipsec: analysis of ike, page 50 |
Author: Radia P. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|