Search Result
Save to File
Your search for
4415
returns
3520
document(s)
Portable unix/Douglas W. Tophan
Author: Tophan, Douglas W.; | Call Number: 005.43 Top p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Unix system v network programming
Author: Rago, Stephen A.; | Call Number: 005.711 Rag u | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
The unix operating system
Author: Christian, Kaare; | Call Number: 005.43 Chr u | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Pengembangan sistem computer aided manufacturing (CAM) berbasis model fased 3D Departemen Tekni Mesin Fakultas Teknik-Universitas Indonesia
Author: Eka Aditya; | Call Number: KP-0734 (Sofkopi KP-293) (SCKP-173) | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Rancangan penerapan audit sistem informasi dengan teknik continuous auditing sebagai sarana evaluasi fungsionalitas sistem informasi berbasis web studi kasus: sistem informasi akademis next- generation Universitas Indonesia
Author: Muhammad Fitriansyah; | Call Number: SK-0966 (Softcopy SK-447) | Type: Skripsi
Find Similar
|
Add To Favorites
|
Detail in New Window
Aplikasi robot pengamanan rumah dengan klasifikasi citra wajah, Hal. A14-A17
Author: Pandapotan Siagian; | Call Number: SEM-300 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Protokol autentikasi HB* sebagai pengamanan RFID di era ubiquitous computing, HAL. 59-64
Author: Arif Rahmad Hakim; Kholif Faiz Ma'ruf; | Call Number: SEM-292 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Metode pengamanan enskripsi RC4 stream cipher untuk aplikasi pelayanan gangguan, HAL. C.49-C.52
Author: Asti Dwi Irfianti; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Impelentasi intrusion detection system pada router WRT54G untuk pengamanan jaringan wireles, HAL. C.145-C.169
Author: Arif Firmanwan; Fathul Wahid; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Watermark untuk pengamanan data pada citra digital menggunakan pendekatan DCT, Hal. 6-10
Author: Riwut Libinuko; | Call Number: SEM-262 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
3
4
5
6
7
8
9
10
11
12
Next