Your search for 45250 returns 545 document(s) |
The B-method: An introduction |
Author: Schneider Steve; | Call Number: 005.1 Sch b | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Graph Theory and Combinatorial Structures: The Heighg of a Random Binary Search Tree, An Analytic Approach to the Height of Binary Search Trees II |
Author: B. Reed, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Pembuatan OR code berdekorasi serta implementasi OR code encoder dengan menggunakan java |
Author: Hendri; | Call Number: SK-0873 (Softcopy SK-355) Source code SK-311 | Type: Skripsi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Optimizing c with assembly code/Peter Gulutzan |
Author: Gulutzan, Peter; | Call Number: 005.136 Gul o | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Refactoring improving the design of existing code |
Author: Fowler, Martin; | Call Number: 005.14 Fow r | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Common vulnerability markup language, (LNCS-Lecture Notes in Computer Science 2576) Hal 228-240 |
Author: Haitao Tian; Liusheng Huang; Zhi Zhou; Hui Zhang; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Mengukur tingkat severity, vulnerability, risk, trust, dan privacy pada penerapan keamanan sistem informasi : studi kasus PT XYZ |
Author: Anniesa Marshadiany; | Call Number: SK-1034 (Softcopy SK-515) | Type: Skripsi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Self Awareness Before Social Networking: Exploring The User Behaviour and Information Security Vulnerability In Malaysia (C7-C12) |
Author: Muhammad Rabiul Hasan; | Call Number: SEM-384 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Klasifikasi tumor otak menggunakan metode local segmented fractal texture binary pattern, Roytated local binary pattern three orthogonal planes dan domintant local binary pattern |
Author: Felix Indra Kurniadi; | Call Number: T-1167 (Softcopy T-876) Source Code T-268 | Edition: 2017 | Type: Tesis
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On signature schemes with threshold verification detecting malicious verifiers, (LNCS-Lecture Notes in Computer Science 1361) Hal 67-78 |
Author: Holger Petersen; Markus Michels; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|