Search Result
Save to File
Your search for
5062
returns
476
document(s)
Managing information security: a program for the electronic information age/ James A. Schweitzer
Author: Schweitzer, James A.; | Call Number: 658.478 Sch m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer security management/ Donn B. Parker
Author: Parker, Donn B.; | Call Number: 658.478 Par c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Simulasi mesin turing dengan mesin pangakses acak menggunakan blok memori
Author: Judhi Santoso; | Call Number: T-0054 | Edition: 1990 | Type: Tesis
Find Similar
|
Add To Favorites
|
Detail in New Window
Penyimpanan stabil
Author: Syukri Yunus; | Call Number: T-0015 | Edition: 1991 | Type: Tesis
Find Similar
|
Add To Favorites
|
Detail in New Window
Solving the year 2000 crisis/ Pataich McDermott
Author: McDermott, Pataich; | Call Number: 005.16 McD | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Panduan lengkap microsoft excel 2000/LPKBM
Call Number: 005.369 Pan | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Comparison and analysis of distributed algorithms for wireless sensor network, Hal. 3206-3209
Author: Fnaglu Ning; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Analisis kegagalan call dari flexi ke GSM di STO Mangga Besar Jakarta Pusat, HAL. 302-310
Author: Mariyani Suna; Uke Kurniawan Usman; Sofia Naning Hertiana; | Call Number: SEM-285 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Perancangan sistem kontrol akses jaringan pada PT X
Author: ADRIZAL; | Call Number: T-0922 (Softcopy T-0576) | Edition: 2010 | Type: Tesis
Find Similar
|
Add To Favorites
|
Detail in New Window
Year 2000: best practice for y2k millennium computing/1998
Call Number: 005.16 Yea | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
4
5
6
7
8
9
10
11
12
13
Next