Search Result
Save to File
Your search for
13999
returns
3841
document(s)
What makes security technologies relevant?, page 38
Author: Li Gong | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Perubahan paradigma dari security menuju survivability, page 28
Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Security of random data perturbation methods, page 487
Author: Muralidhar | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Interfutures: facing the future/ Organization for economic cooperation and development
Author: Organization for economic cooperation and development; | Call Number: 158.7 Org i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Gamers Jump into broadband technology* intel has new chip design for handelds* patent expiration begins new encryption era, page 16
Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
The Professional Development Challenge for IT Professionals
Author: Thomas Schambach, [et all] | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Office automation: the productivity challenge
Author: Chorafas, Dimitris N.; | Call Number: 651.84 Cho o | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Meaningful Healthcare Security: Does Meaningful-Use Attestation Improve Information Security Performance?, Page 1043-1067
Author: Juhee Kwon and M. Eric Johnson | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Initiative takes long view of tele-immersion* will wireless be IPv6's killer app? , page 28
Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Protocol-related problem threaterns internet* Faster storage connectivity technologies emerge* New wireless technology is in sight, page 20
Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
3
4
5
6
7
8
9
10
11
12
Next