Search Result Save to File Save as CSV
Your search for 13419 returns 5316 document(s)
A Modified random perturbation method for database security, page 47
Author: Tendick, P. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Correlated failures, diversification, and information security risk management, page 397-422
Author: Pei-yu Chen, Gaurav Kataria, and Ramayya Krishnan | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Security enhancement of route optimization in mobile IPv6 networks, page 1-19
Author: A. Mehdizadeh; S. Khatun; B. M. Ali; R.S.A. Abdullah; G. Kurup | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Proactive versus reactive security investments in the healthcare sector, page 451-471
Author: Juhee Kwon and M. Eric Johnson | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Quality competition and market segmentation in the security software market, page 589-606
Author: Debabrata Dey, Atanu Lahiri, and Guoying Zhang | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Toward a Unified Model of Information Security Policy Compliance, Page 285-311
Author: Gregory D. Moody, Mikko Siponen, and Seppo Pahnila | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Corner Cutting Systems, page 81-98
Author: J. Delgado, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Bias in computer systems, page 330
Author: Batya F. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
BAIK (Bahasa anak indonesia untuk komputer)-programming language based on indonesian lexical parsing for multitier web development
Author: Haris Hasanudin | Call Number: Jurnal Ilmu Komputer dan Informasi (JIKI) Vol. 3 No. 2 Juni 2010 | Type: UI-ana Indek Artikel
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography: a new dimension in computer data security: a guide for the design and implementation of secure systems
Author: Meyer, Carl H.; | Call Number: 652.8 Mey c | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next