Your search for 12399 returns 381 document(s) |
Deficiencies in LDAP When Used to Support PKI |
Author: David Chadwick | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Will PKI become a key to online security?, page 13 |
Author: Sixto Ortiz | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
PKI: it's not dead, just resting, page 41 |
Author: Peter Gutmann | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A trusted PKI architecture based on fingerprint encryption, 336-340 |
Author: Jiangming Cui, Xiaojun Zhang, Nan Su, Zongsheng Lai; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
LDAP system administration/ Gerald Carter |
Author: Carter, Gerald; | Call Number: 005.713 69 Car l | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Do Ontological deficiencies in modeling grammars matter?, page 57-79 |
Author: Jan Recker, Michael Rosemann, Peter Green, and Marta Indulska | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Glossary of terms used in automatic data processing |
Call Number: R. 004.03 Glo | Type: Buku Referensi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Test disc used in conjuction with CD-ROM diagnosis |
Call Number: 005.43 IBM | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Converged PKI-Based Authorization,Authentication Management and Delegation for an E-Business |
Author: Mani Anand K.P,Narayanasamy P; | Call Number: SEM-305 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
When growth stalls, page 50 |
Author: Matthew S. Olson; Derek Van Bever and Seth Verry | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|