Your search for 13897 returns 4097 document(s) |
Malicious code moves to mobile devices, page 16 |
Author: Neal Leavitt | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
IMB begins autonomic-computing project* Malicious code hits instant messaging* Faster processors with optical connections, page 25 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Bringing the wireless internet to mobile devices, page 54 |
Author: Subhasis Saha | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Trojans, Worms, and spyware: a computer security professional's guide to malicious code |
Author: Erbschloe, Michael; | Call Number: 005.84 Erb t | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Deteksi malicious code pada PHP berdasarkan analisis statis dinamis pada zend engine |
Author: Fariskhi Vidyan; | Call Number: SK-1502 (Softcopy SK-984) Source Code SK-609 | Edition: Amril Syalim | Type: Skripsi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Design capital and design moves: the logic of digital business strategy, page 537-564 |
Author: C.Jason Woodard, Narayan Ramasubbu, F. Ted Tschang, V Sambamurthy | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Risky Business, page 16 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Payments and Banking With Mobile Personal Devices |
Author: Amir Herzberg | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Mobile Agent Watermarking and Fingerprinting: Trecing Malicious Hosts(927-936) |
Author: Oscar Esparza
Marcel Fernandez
Miguel Soriano
Jose L. Munoz
Jordi Forne; | Call Number: SEM-381 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A framwork for collaborative computing, page 16 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|