Search Result
Save to File
Your search for
41937
returns
1247
document(s)
Refactoring improving the design of existing code
Author: Fowler, Martin; | Call Number: 005.14 Fow r | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Aplikasi kriptografi sebagai pengaman komunikasi pada PSTN berbasis FPGA, HAL. 21-27
Author: Muhammad Ary Murti; Sony Sumaryo; | Call Number: SEM-286 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Kriteria teknik kriptografi untuk image steganografi berbasis singular value decomposition, Hal. 290-293
Author: Sari Agustini H.; Danang Jaya; | Call Number: SEM-276 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Implementasi Skema Proxy Re-Encryption untuk Kriptografi Kunci Simetris Menggunakan Rust
Author: Josh Steven Lasiman; | Call Number: SK-2313 (Softcopy SK-1795) | Edition: Amril Syamlim | Type: Skripsi
Find Similar
|
Add To Favorites
|
Detail in New Window
Reformasi birokrasi Berbasiskan Tik Di Pemerintahan
Author: Albaar Rubhasy , Farisya Setiadi , Zainal A. Hasibuan; | Call Number: SEM-356 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Mutipath routing berbasiskan tingkat keandalan
Author: Anugrah Ramadhani; | Call Number: T-1058 (Softcopy T-767) Source Code T-199 | Edition: 2014 | Type: Tesis
Find Similar
|
Add To Favorites
|
Detail in New Window
Kondisi pengamanan sistem informasi 56 perusahaan Indonesia, page 76
Author: Agus Pracoyo | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Aplikasi robot pengamanan rumah dengan klasifikasi citra wajah, Hal. A14-A17
Author: Pandapotan Siagian; | Call Number: SEM-300 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Protokol autentikasi HB* sebagai pengamanan RFID di era ubiquitous computing, HAL. 59-64
Author: Arif Rahmad Hakim; Kholif Faiz Ma'ruf; | Call Number: SEM-292 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Metode pengamanan enskripsi RC4 stream cipher untuk aplikasi pelayanan gangguan, HAL. C.49-C.52
Author: Asti Dwi Irfianti; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
1
2
3
4
5
6
7
8
9
10
Next