Your search for 12432 returns 2167 document(s) |
Digital government security infrastructure design challenges, page 66 |
Author: James Joshi | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Trust-based security in pervasive computing environments, page 154 |
Author: Lalana Kagal | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Wanted: more network-security graduates and research, page 22 |
Author: Linda Dailey P. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Technology standards pros aid homeland security, page 104 |
Author: Kate M. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Enterprise security di hotspot best practices untuk para pekerja mobile, page 15 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Microsoft windows security inside out for windows XP and windows 2000 |
Author: Bott, Ed; | Call Number: 005.8 Bot m | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Modified random perturbation method for database security, page 47 |
Author: Tendick, P. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Correlated failures, diversification, and information security risk management, page 397-422 |
Author: Pei-yu Chen, Gaurav Kataria, and Ramayya Krishnan | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security enhancement of route optimization in mobile IPv6 networks, page 1-19 |
Author: A. Mehdizadeh; S. Khatun; B. M. Ali; R.S.A. Abdullah; G. Kurup | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and Network security principles and practice 5th ed. (INSTRUCTOR'S MANUAL) |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Instructor's Manual
|
Find Similar |
Add To Favorites |
Detail in New Window
|