Search Result Save to File Save as CSV
Your search for 47525 returns 1566 document(s)
Multi-factor enterprise system methodology: an approach to Enterprise Resource Planning (ERP) system implementation
Author: Gede Rasben Dantes; | Call Number: Ringdis-025 | Type: Ringkasan Disertasi
Find Similar |  Add To Favorites |  Detail in New Window 
Multi-factor enterprise system methodology: an approach to Enterprise Resource Planning (ERP) system implementation
Author: Gede Rasben Dantes; | Call Number: Dis-025 (Softcopy Dis-016) | Type: Disertasi
Find Similar |  Add To Favorites |  Detail in New Window 
Building database applications on the web using PHP 3
Author: Hilton, Craig; | Call Number: 005.276 2 Hil b Title | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Panel: building and using test collection, Hal. 335-337
Call Number: SEM-248 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Building business applications using C++/Lucy Garnett
Author: Garnett, Lucy; | Call Number: 005.133 Gar b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Building database applications on the web using PHP 3
Author: Hilton, Craig; | Call Number: 005.276 2 Hil b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Formal analysis of an authentication protocol for UMTS (Universal Mobile Telecommunications systems) Using AVISPA
Author: Ilham W. Kurnia; L. Yohanes Stefanus; Ari Saptawijaya | Call Number: Jurnal Ilmu Komputer dan Informasi (JIKI) Vol. 1 No. 2 Juni 2008 | Type: UI-ana Indek Artikel
Find Similar |  Add To Favorites |  Detail in New Window 
Fingerprint synthesis towards constructing an enhanced authentication system using low resolution webcam, HAL. 679-688
Author: Md. Rajibul Islam; Md. Shohel Sayeed and Andrews Samraj; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Secure smartcard-based fingerprint authentication using gabor filter and fuzzy vault, Hal. 442-446
Author: Rifki Sadikin, Esa Prakasa; | Call Number: SEM-276 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Remote user authentication using public information, LNCS-Lecture Notes in Computer Science 2898), Hal. 360-369
Author: Chris J. Mitchell; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next