Search Result
Save to File
Your search for
4835
returns
3442
document(s)
Using the DEA Methodology to Rank Software Technical Efficiency
Author: Ines Herrero, [et all] | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Using Asset Specificity and Asset Scope to Measure the Value of IT
Author: John Tillquist, [et all] | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Using the common criteria for it security evaluation/ Debra S. Hermann
Author: Hermann, Debra S.; | Call Number: 005.8 Her s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Database Repairing Using Updates, page 722-768
Author: J. Wijsen | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Query Clustering Using User Logs, page 59-81
Author: J. -R. Wen, [et all] | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
A Framework for Using Insurance for Cyber-Risk Management
Author: Lawrence A. Gordon, [et all] | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Aspect-Oriented Programming Using Reflection and Metaobject Protocols
Author: Gregory T. Sullivan | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Composing Crosscutting Concerns Using Composition Filters
Author: Lodewijk Bergmans, [et all] | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Using technology and innovation to simulate daily life
Author: Michael M. | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Graphical programming using UML and SQL, page 30
Author: Morgan B. | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
24
25
26
27
28
29
30
31
32
33
Next