Search Result Save to File Save as CSV
Your search for 54646 returns 2110 document(s)
Penjaminan mutu sistem informasi bantuan operasioal sekolah melalui pengujian performansi keamanan dan keakuratan
Author: Adi Setiadi; | Call Number: SK-0971 (Softcopy SK-452) Source code SK-365 | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan use case scenario berdasarkan deskripsi tekstual use case menggunakan pengenalan entitas bernama/ Mirnasari Dewi
Author: Mirnasari Dewi; | Call Number: SK-0595 (Softcopy SK-69) Source Code SK-17 | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Rencana Uji Akseptasi untuk aplikasi inventori studi kasus: PT BLUE BIRD Group
Author: Satriyo Adi Prabowo,; | Call Number: T-0460 (Softcopy T-0079) | Edition: 2004 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Data security through graphical authentication schemes, HAL. 1013-1024
Author: M.N. Djoja; Naveen Kumar; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan Desain Knowledge Management System Ummul'L Quro Depok Melalui Pendekatan User-Centered Design
Author: Amilah Zahiroh; Diva Amelia; Nazila Rahma; | Call Number: SK-2027 (Softcopy SK-1509) | Edition: Dadan Hardianto | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Design of testable logic circuits
Author: Bennetts, R.G.; | Call Number: 621.395 Ben d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prioritization Of Playbility Heuristic Evaluation For Educational Computer Games (PHEG) Technique Using Analytic Hierarchy Process (105)
Author: Hasiah Mohammed Azizah Jaafar; | Call Number: SEM-311 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Proving programs correct
Author: Anderson, Robert B.; | Call Number: 005.3 And p | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan program uji kestabilan sistem dengan metode root locus, HAL. 213-218
Author: Suhariningsih; | Call Number: SEM-286 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
ITMS - a case study of a secure web application using OWSP guideline, Hal. 494-499
Author: Khairul Anwar Sedek, Mohd Nizam Osman, Nortis bt Osman; | Call Number: SEM-276 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   3 4 5 6 7 8 9 10 11 12  Next