Search Result Save to File Save as CSV
Your search for 12399 returns 381 document(s)
Deficiencies in LDAP When Used to Support PKI
Author: David Chadwick | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Will PKI become a key to online security?, page 13
Author: Sixto Ortiz | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
PKI: it's not dead, just resting, page 41
Author: Peter Gutmann | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
A trusted PKI architecture based on fingerprint encryption, 336-340
Author: Jiangming Cui, Xiaojun Zhang, Nan Su, Zongsheng Lai; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
LDAP system administration/ Gerald Carter
Author: Carter, Gerald; | Call Number: 005.713 69 Car l | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Do Ontological deficiencies in modeling grammars matter?, page 57-79
Author: Jan Recker, Michael Rosemann, Peter Green, and Marta Indulska | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Glossary of terms used in automatic data processing
Call Number: R. 004.03 Glo | Type: Buku Referensi
Find Similar |  Add To Favorites |  Detail in New Window 
Test disc used in conjuction with CD-ROM diagnosis
Call Number: 005.43 IBM | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Converged PKI-Based Authorization,Authentication Management and Delegation for an E-Business
Author: Mani Anand K.P,Narayanasamy P; | Call Number: SEM-305 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
When growth stalls, page 50
Author: Matthew S. Olson; Derek Van Bever and Seth Verry | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next