Search Result
Save to File
Your search for
13422
returns
3767
document(s)
Reviewing Amenesia Support in Dtabase Recovery Protocols (717-734)
Author: Ruben de Juan-Marin Luis H.Garcia-Munoz J.Enrique Armendariz-Inigo Francesc D.Munoz-Escon; | Call Number: SEM-376 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
A Method and Protocols for E-payment in E-commerce (V1-138 -- V1-142)
Author: Shijin Yuan Bin Mu; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Exploiting symmetry when verifying transistor-level circuits by symbolic trajectory evaluation, (LNCS-Lecture Notes in Computer Science 1254) Hal 244-255
Author: Manish Pandey; Randal E. Bryant; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Protection and security on the information superhighway
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
ITI security management/
Call Number: 658.403 8 Caz i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Database security integrity
Author: Fernandez, Eduardo B.; | Call Number: 005.74 Fer d | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Security for computer systems
Author: Farr, M.A..L; | Call Number: 005.8 Far s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Iformation systems security
Author: Fisher, Royal P.; | Call Number: 658.478 Fis | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Protection and security on the information superhighway
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer and information security handbook
Author: Vacca, John R.; | Call Number: 005.8 Vac c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
6
7
8
9
10
11
12
13
14
15
Next