Search Result Save to File Save as CSV
Your search for 54482 returns 821 document(s)
Implementasi tmato firmware pada linksys wireless router dengan proses authentication,accounting menggunakan radius server. ( hal. F-51/F-55 )
Author: Rochmad Nurul Hidayat; | Call Number: SEM-366 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Kajian tentang Aspek security dan Authentication Sistem Informasi On Line Studi Kasus : Rancangan Sistem Informasi Akademi PEFEUI
Author: Heri Yulianto; | Call Number: T-0186 (Softcopy T-0622) | Edition: 2000 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Sistem kripto dengan kunci publik aplikasinya pada pembuatan skema pemeriksaan keaslian password
Author: Inu Laksito Wibowo; | Call Number: T-0055 | Edition: 1992 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Free mobile chatting dan conferencing untuk local community menggunakan java programming ( Hal 37 - 44 )
Author: Arini, MT,or Qorrutul ' Aini, MT , Septian Fajar Nugraha, S.KOM; | Call Number: SEM - 365 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prototipe knowledge management system berbasis wiki untuk keperluan proyek rekayasa perangkat lunak: studi kasus Pusat Ilmu Komputer Universitas Indonesia
Author: Salman El Farisi; | Call Number: SK-0949 (Softcopy SK-430) Source code SK-352 | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Data security through graphical authentication schemes, HAL. 1013-1024
Author: M.N. Djoja; Naveen Kumar; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
EAP-Based authentication for ad hoc network, HAL. C.133-C.138
Author: Muhammad Agni Catur Bhakti; Azween Abudllah dan Low Tan Jung; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Data authentication protocol modeling on multilayer data hiding for multilayer protocol hiding. hal, 112
Author: Christian Gustav; | Call Number: SEM-317 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Discovering communication threads in emails using a conceptual clustering approach, HAL. 221-229
Author: Anjali Ganesh Jivant; | Call Number: SEM-291 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Lotus mail internet e-mail for business 4.5 release part no. T05120
Call Number: 005.3 Lot | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next