Search Result Save to File Save as CSV
Your search for 45250 returns 545 document(s)
The B-method: An introduction
Author: Schneider Steve; | Call Number: 005.1 Sch b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Graph Theory and Combinatorial Structures: The Heighg of a Random Binary Search Tree, An Analytic Approach to the Height of Binary Search Trees II
Author: B. Reed, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Pembuatan OR code berdekorasi serta implementasi OR code encoder dengan menggunakan java
Author: Hendri; | Call Number: SK-0873 (Softcopy SK-355) Source code SK-311 | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Optimizing c with assembly code/Peter Gulutzan
Author: Gulutzan, Peter; | Call Number: 005.136 Gul o | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Refactoring improving the design of existing code
Author: Fowler, Martin; | Call Number: 005.14 Fow r | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Common vulnerability markup language, (LNCS-Lecture Notes in Computer Science 2576) Hal 228-240
Author: Haitao Tian; Liusheng Huang; Zhi Zhou; Hui Zhang; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Mengukur tingkat severity, vulnerability, risk, trust, dan privacy pada penerapan keamanan sistem informasi : studi kasus PT XYZ
Author: Anniesa Marshadiany; | Call Number: SK-1034 (Softcopy SK-515) | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Self Awareness Before Social Networking: Exploring The User Behaviour and Information Security Vulnerability In Malaysia (C7-C12)
Author: Muhammad Rabiul Hasan; | Call Number: SEM-384 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Klasifikasi tumor otak menggunakan metode local segmented fractal texture binary pattern, Roytated local binary pattern three orthogonal planes dan domintant local binary pattern
Author: Felix Indra Kurniadi; | Call Number: T-1167 (Softcopy T-876) Source Code T-268 | Edition: 2017 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
On signature schemes with threshold verification detecting malicious verifiers, (LNCS-Lecture Notes in Computer Science 1361) Hal 67-78
Author: Holger Petersen; Markus Michels; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next