Your search for 42689 returns 3649 document(s) |
Data authentication protocol modeling on multilayer data hiding for multilayer protocol hiding. hal, 112 |
Author: Christian Gustav; | Call Number: SEM-317 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Data security through graphical authentication schemes, HAL. 1013-1024 |
Author: M.N. Djoja; Naveen Kumar; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secure smartcard-based fingerprint authentication using gabor filter and fuzzy vault, Hal. 442-446 |
Author: Rifki Sadikin, Esa Prakasa; | Call Number: SEM-276 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Business continuity planning for data centers and systems |
Author: Bowman, Ronald H.; | Call Number: 658.478 Bow b | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information hiding techniques for steganography and digital watermarking/ Stefan Katzenbeisser |
Call Number: 005.8 Inf | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
DATA MINING PENGKLASIFIKASIAN PELANGGAN PEMBELI MOBIL DENGAN METODE DECISION TREE |
Author: Sadly Syasmuddin, Sitti Aisa; | Call Number: SEM-361 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and Data Security |
Author: Denning, Dorothy E.; | Call Number: 005.8 Den c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Clasification using P-tree regarding yeast gene deletion data, HAL. 1074-1076 |
Author: V.N. Rajavarman; S.P. Rajagopalan; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Penerapan data mining untuk menggali tingkat resiko calon pemegang polis: studi kasus pada PT. Car, Hal. 536- 561 |
Author: Henry Wijaya Purwa Tanuwijaya; Yudho Giri Sucahyo; | Call Number: SEM-276 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Implementasi tmato firmware pada linksys wireless router dengan proses authentication,accounting menggunakan radius server. ( hal. F-51/F-55 ) |
Author: Rochmad Nurul Hidayat; | Call Number: SEM-366 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|