Your search for 43355 returns 158 document(s) |
The information system concept for qualilty system on product development made from CPO, Hal. 1.1-1.3 |
Author: Wawan Kurniawan and Ismed Adburrachman; | Call Number: SEM-280 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secure multi-party computation made simple, (LNCS-Lecture Notes in Computer Science 2576) Hal 14-28 |
Author: Ueli Maurer; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Basics of hacking and penetration testing: ethical hacking and penetration testing made easy 2nd ed. |
Author: Engebretson, Patrick; | Call Number: 005.8 Eng b | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Made with Creative commons: panduan praktis penerapan model bisnis terbuka oleh creative commons |
Author: Stacey, Paul, Pearson, Sarah; | Call Number: 658.403 Pau M | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Internet security made easy: a plain english guide to protecting yourself and your company online/Douglas Schwitzer |
Author: Schweitzer, Douglas; | Call Number: 005.8 Sch i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Perancangan penganalisis struktural kalimat bahasa Indonesia, khususnya frasa nominal, dengan menggunakan constraint-based formalism, dan penerapannya pada media Massa elektronika/ I Made Dwijendra Sulastra |
Author: I Made Dwijendra Sulastra; | Call Number: SK-0501(Softkopi SK-11) | Edition: Bobby Nazief | Type: Skripsi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Study on relationship qualilty of the accounting rules maker and business enterprises impact on the quality of financial reports, Hal. 3603-3606 |
Author: Yueming Zeng; Yuan Wang; Cari Huang; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Development and implementation of web applications to nationcal academy accounting jakarta with object oriented methodology, 175-178 |
Author: Neny Rosmawarni, Ina Agustina, Ariana Azimah; | Call Number: SEM-348 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
When Do IT Security Investments Matter? Accounting for the Influence of Institutional Factors in the Context of Healthcare Data Breaches, Page 893-916 |
Author: Corey M. Angst, Emily S. Block, John D’Arcy, and Ken Kelley | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Implementasi tmato firmware pada linksys wireless router dengan proses authentication,accounting menggunakan radius server. ( hal. F-51/F-55 ) |
Author: Rochmad Nurul Hidayat; | Call Number: SEM-366 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|