Search Result Save to File Save as CSV
Your search for 46838 returns 4033 document(s)
Managing software security risks, page 99
Author: Gary M. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
The Trusted PC: skin-deep security, page 103
Author: Andrew B.W. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
What makes security technologies relevant?, page 38
Author: Li Gong | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Job security vs gaji, page 16
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Perubahan paradigma dari security menuju survivability, page 28
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Security of random data perturbation methods, page 487
Author: Muralidhar | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Measurement and tuning of computer systems
Author: Ferrari, Domenico; | Call Number: 004.61 Fer m | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
System performance tuning
Author: Loukides, Mike; | Call Number: 005.43 Lou s | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Design and Evaluation of Auto-ID Enabled Shopping Assistance Artifacts in Customers’ Mobile Phones: Two Retail Store Laboratory Experiments, Page 83-113
Author: Viswanath Venkatesh, John A. Aloysius, Hartmut Hoehle, and Scot Burton | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Eye mouse based HCI for people with disablities, Hal. VI.8-VI.12
Author: Supeno Mardi S.N. Mochamad Hariadi; Eko Handoko; Achmad Affandi; | Call Number: SEM-280 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   6 7 8 9 10 11 12 13 14 15  Next