Skip to content
Toggle navigation
Tentang IOS
Join Us
Hubungi Kami
Organisasi Mitra
Akun Anda
Keluar
Masuk
Bahasa Indonesia
Bahasa Indonesia
English
Semua Kolom
Judul
Pengarang
Subject
Call Number
ISBN/ISSN
Tag
Cari
Lanjutan
Pengarang
Rajinder Singh
Koleksi Nasional
Menampilkan
1
-
5
of
5
untuk pencarian:
'Rajinder Singh'
, lama mencari: 0.08s
Daftar
Grid
Visual
Sortir
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Muslims in south east asia : a study in minority problem
Book
oleh
Chauchan,
Rajinder
Singh
Terbitan:
Kanishka, 1991
Available online:
Get online
Favorit
Tersimpan di:
COMPARISON OF WEB - MINING TECHNIQUES - A SURVEY PAPER
Article
Journal
oleh
Surender Singh
,
Rajinder
Singh
Terbitan:
2020
Available online:
Get online
Favorit
Tersimpan di:
DESIGN OF A LOW POWER CONSUMING SRAM CELL USING MINIMUM TRANSISTORS IN FINFET TECHNOLOGY
Article
oleh
Rajinder
Singh
*, Shelly Kalra
Terbitan:
2017
Available online:
Get online
Favorit
Tersimpan di:
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
Article
oleh
Rajinder
Singh
,
Satish Kumar
Terbitan:
2019
Available online:
Get online
Favorit
Tersimpan di:
Current Issue : The International Journal of Network Security & Its Applications (IJNSA)
Article
oleh
Michal Kedziora
,
Paulina Gawin
,
Michal Szczepanik
,
Ireneusz Jozwiak
,
Rajinder
Singh
,
Satish Kumar
,
Ezedin Barka
,
Chaker Abdelaziz Kerrache
,
Hadjer Benkraouda
,
khaled Shuaib
,
A.F. Al Azzawi
,
Ahmad Bany Doumi
,
Mohammad Qatawneh
,
B.Maheswara Rao
,
S.Baskar
Terbitan:
2019
Available online:
Get online
Favorit
Tersimpan di:
Search Tools:
Get RSS Feed
—
Email this Search
—
Related Subjects
)
2X9.659
Ad Hoc and Sensor Network Security
CMOS Logic
Cryptographic protocols
Data Mining Web Content Mining Web Structure Mining
Database and System Security
De-Authentication Attack
E-mail fraud
E-mail security
Internet Security & Applications
Intrusion Detection and Prevention
Islam - Sejarah
Kali Linux
Low power
MiM
Mobile
Network and Wireless Network Security
Peer-to-Peer Network Security
Performance Evaluations of Protocols & Security Application
Phishing
Python
Replay attack etc
SRAM and VLSI
Scapy
Security & Network Management
Security threats & countermeasures (DDoS
Session Hijacking
Spam
Speed
Trojan Protection
Ubiquitous Computing Security
Virus
Web 2.0 security
worms
×
Loading...