Search Result Save to File Save as CSV
Your search for 4835 returns 3442 document(s)
Using the DEA Methodology to Rank Software Technical Efficiency
Author: Ines Herrero, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Using Asset Specificity and Asset Scope to Measure the Value of IT
Author: John Tillquist, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Using the common criteria for it security evaluation/ Debra S. Hermann
Author: Hermann, Debra S.; | Call Number: 005.8 Her s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Database Repairing Using Updates, page 722-768
Author: J. Wijsen | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Query Clustering Using User Logs, page 59-81
Author: J. -R. Wen, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
A Framework for Using Insurance for Cyber-Risk Management
Author: Lawrence A. Gordon, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Aspect-Oriented Programming Using Reflection and Metaobject Protocols
Author: Gregory T. Sullivan | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Composing Crosscutting Concerns Using Composition Filters
Author: Lodewijk Bergmans, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Using technology and innovation to simulate daily life
Author: Michael M. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Graphical programming using UML and SQL, page 30
Author: Morgan B. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   24 25 26 27 28 29 30 31 32 33  Next