Search Result
Save to File
Your search for
12432
returns
2143
document(s)
Open source security: oportunity or oxymoron, page 18
Author: Goerge Lawton | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Managing software security risks, page 99
Author: Gary M. | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
The Trusted PC: skin-deep security, page 103
Author: Andrew B.W. | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
What makes security technologies relevant?, page 38
Author: Li Gong | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Job security vs gaji, page 16
Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Perubahan paradigma dari security menuju survivability, page 28
Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Security of random data perturbation methods, page 487
Author: Muralidhar | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
ATM control, audit and security/ Chester M. WInters
Author: Winters, Chester M.; | Call Number: 005.8 Win a | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
International journal of computer science and network security
Call Number: 9 (2009): 6 June | Type: Jurnal/ Majalah
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer network security: theory and practice/ Jie Wang
Author: Wang Jie; | Call Number: 005.8 Wan c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
7
8
9
10
11
12
13
14
15
16
Next