Search Result Save to File Save as CSV
Your search for 53158 returns 4428 document(s)
E-mail protection advances with new technologies , page 21
Author: Sixto Ortiz | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Copy protection technology is doomed, page 48
Author: Dan S.W. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Copy protection for high-definition baseband video, Hal. 174-177
Author: David A. Barr; | Call Number: SEM-259 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Techniques and applications of digital watermarking and content protection
Author: Arnold, Michael; | Call Number: 005.8 Arn t | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Abstractionin recovery management (72-84)
Author: J. Eliot B. Moos, Nancy D. Griffeth, marc H. Graham; | Call Number: SEM-360 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Abstractionin recovery management (72-84)
Author: J. Eliot B. Moos, Nancy D. Griffeth, marc H. Graham; | Call Number: SEM-360 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Data services and data services life cycle as part or service oriented architecture, HAL. 858-864
Author: Tapati Bandopadhjay; Pradcep Kumar; Gita A. Kumta; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan sistem support service fungsi penampilan data, pemasukan data barang, dan pembuatan laporan PT Sun microsystems Indonesia
Author: Fajran Iman Rusadi; | Call Number: KP-0696 (Softkopi KP-260) (SCKP-141) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan table service untuk melayani data berbentuk tabel dan data integration web dashboad
Author: CAKRA WISHNU WARDHANA; | Call Number: KP-2180 (Softcopy KP-1742) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Insiders’ Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors, page 1189-1210
Author: Clay Posey, Tom L. Roberts, Paul Benjamin Lowry, Rebecca J. Bennett, and James F. Courtney | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   2 3 4 5 6 7 8 9 10 11  Next