Search Result Save to File Save as CSV
Your search for 14253 returns 3671 document(s)
Computer viruses and anti-virus warfare/Jan Hruska
Author: Hruska, Jan; | Call Number: 005.84 Hru c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Genetic Algorithm Adopting Selective Virus Infection (289-293)
Author: Kenji Tamura Atsuko Mutoh Shohei Kato Hidenori Itoh; | Call Number: SEM-306 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Promoting Energy Conservation Behaviour: A Plausible Solution to Energy Sustainability Threats
Author: Low Sheau Thing1, Abdul Hakim Bin Mohammad2, Choong Weng Wai3; | Call Number: SEM-354 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Wireless Security Models, Threats, and Solutions/ Randall K. Nichols & Panos C. Lekkas
Author: Nichols, Randal K.; | Call Number: 384 Nic w [MTI] | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
IT Risk: turning business threats into competitive advantage/ George Westerman; Richard Hunter
Author: Westerman, George; | Call Number: 658.403 8 Wes i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Acer easy build 1.1 : acer LAN desk virus protect 3.0 enterprise, wide virus protection
Call Number: 004.7 Ace | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
A New Approach to Characterizing the Relative Position of Two Ellipses Depending on One Parameter, page 324-350
Author: F. Etayo, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Unit Quaternion Integral Curve: A New Type Of Fair Free-Form Curves, page 39-58
Author: K. T. Miura | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
U.S. Picks new encryption standard* better software with open source* taking a SIP of internet telephony, page 20
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Researchess develop new search techniques* fake networks decoy hackers* vendors begin laser networking, page 19
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   7 8 9 10 11 12 13 14 15 16  Next