Your search for 13419 returns 5316 document(s) |
A Modified random perturbation method for database security, page 47 |
Author: Tendick, P. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Correlated failures, diversification, and information security risk management, page 397-422 |
Author: Pei-yu Chen, Gaurav Kataria, and Ramayya Krishnan | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security enhancement of route optimization in mobile IPv6 networks, page 1-19 |
Author: A. Mehdizadeh; S. Khatun; B. M. Ali; R.S.A. Abdullah; G. Kurup | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Proactive versus reactive security investments in the healthcare sector, page 451-471 |
Author: Juhee Kwon and M. Eric Johnson | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Quality competition and market segmentation in the security software market, page 589-606 |
Author: Debabrata Dey, Atanu Lahiri, and Guoying Zhang | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Toward a Unified Model of Information Security Policy Compliance, Page 285-311 |
Author: Gregory D. Moody, Mikko Siponen, and Seppo Pahnila | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Corner Cutting Systems, page 81-98 |
Author: J. Delgado, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Bias in computer systems, page 330 |
Author: Batya F. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
BAIK (Bahasa anak indonesia untuk komputer)-programming language based on indonesian lexical parsing for multitier web development |
Author: Haris Hasanudin | Call Number: Jurnal Ilmu Komputer dan Informasi (JIKI) Vol. 3 No. 2 Juni 2010 | Type: UI-ana Indek Artikel
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography: a new dimension in computer data security: a guide for the design and implementation of secure systems |
Author: Meyer, Carl H.; | Call Number: 652.8 Mey c | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|