Search Result Save to File Save as CSV
Your search for 13419 returns 5316 document(s)
When Do IT Security Investments Matter? Accounting for the Influence of Institutional Factors in the Context of Healthcare Data Breaches, Page 893-916
Author: Corey M. Angst, Emily S. Block, John D’Arcy, and Ken Kelley | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Developing Multiagent Systems: The Gaia Methodology, page 317-370
Author: F. Zambonelli, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
A Codesign approach for distributed systems, page 110
Author: Hessam S. S. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Unifying software engineering and systems engineering, page 114
Author: Barry Boebm | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Toward self-healing infrastructure systems, page 44
Author: Massoud Amin | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Survivable information storage systems, page 61
Author: Jay J. Wylie | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Component-based systems: a classification of issues, page 54
Author: Pearl B. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Executable specifications for embedded distributed systems, page 138
Author: Miroslav sveda | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Platform tuning for embedded systems designs, page 112
Author: Frank Vahid | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
How computer systems embody values, page 120
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   2 3 4 5 6 7 8 9 10 11  Next