Search Result
Save to File
Your search for
4956
returns
1343
document(s)
C-Logic of Complex Obejcts (369-378)
Author: Weidong Chen David S. Warren; | Call Number: SEM-379 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Introduction to Computing and Algorithms
Author: Shackelford, Russel L.; | Call Number: 005.1 Sha i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Neural computing: an introduction/R. Beale
Author: Beale, R.; | Call Number: 006.3 Bea n | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Protection and security on the information superhighway
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer forensics: computer crime scene investigation
Author: Vacca, John R.; | Call Number: 363.259 68 Vac c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Using the common criteria for it security evaluation/ Debra S. Hermann
Author: Hermann, Debra S.; | Call Number: 005.8 Her s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer forensics: computer crime scene investigation
Author: Vacca, John R.; | Call Number: 363.259 68 Vac c | Type: Softcopy Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Secure wireles sensor network: solusi efisiensi sistem keamanan ubiquitous sensor network, HAL. 421-426
Author: Kholif Faiz Ma'ruf; Arif Rahman Hakim; | Call Number: SEM-292 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Data security through graphical authentication schemes, HAL. 1013-1024
Author: M.N. Djoja; Naveen Kumar; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Protection and security on the information superhigway
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
14
15
16
17
18
19
20
21
22
23
Next