Table of Contents
COMPUTER NETWORK SECURITY
Andika Agus Slameto, James Tanjung
10.35842/jtir.v17i3.470
Abstract views : 109
| PDF views : 6
|
22-29
|
Yudi Sutanto, Dikky Rizal Alfianto
10.35842/jtir.v17i3.469
Abstract views : 186
| PDF views : 6
|
53-59
|
MOBILE COMPUTING
Hendra Kurniawan, Bagus Yudha Pratama, Muhammad Tofa Nurcholis
10.35842/jtir.v17i3.475
Abstract views : 88
| PDF views : 5
|
47-52
|
COMPUTING THEORY
Dimas Dwi Nugroho, Arief Setyanto, Hanif Al Fatta
10.35842/jtir.v17i3.466
Abstract views : 144
| PDF views : 0
|
38-46
|
IMAGE PROCESSING
Hendra Kurniawan, Nisa Nur Haniva
10.35842/jtir.v17i3.474
Abstract views : 433
| PDF views : 8
|
13-21
|
bernadhed Bernadhed, Firman Asharudin, Mulia Sulistyono
10.35842/jtir.v17i3.476
Abstract views : 134
| PDF views : 7
|
30-37
|
INFORMATION SYSTEM
Danny Ong, Imron Imron, M. Sinta Nurhayati, Andriansah Andriansah
10.35842/jtir.v17i3.468
Abstract views : 86
| PDF views : 6
|
1-12
|