Your search for 14253 returns 3671 document(s) |
Computer viruses and anti-virus warfare/Jan Hruska |
Author: Hruska, Jan; | Call Number: 005.84 Hru c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Genetic Algorithm Adopting Selective Virus Infection (289-293) |
Author: Kenji Tamura
Atsuko Mutoh
Shohei Kato
Hidenori Itoh; | Call Number: SEM-306 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Promoting Energy Conservation Behaviour: A Plausible Solution to Energy Sustainability Threats |
Author: Low Sheau Thing1, Abdul Hakim Bin Mohammad2, Choong Weng Wai3; | Call Number: SEM-354 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Wireless Security Models, Threats, and Solutions/ Randall K. Nichols & Panos C. Lekkas |
Author: Nichols, Randal K.; | Call Number: 384 Nic w [MTI] | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
IT Risk: turning business threats into competitive advantage/ George Westerman; Richard Hunter |
Author: Westerman, George; | Call Number: 658.403 8 Wes i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Acer easy build 1.1 : acer LAN desk virus protect 3.0 enterprise, wide virus protection |
Call Number: 004.7 Ace | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A New Approach to Characterizing the Relative Position of Two Ellipses Depending on One Parameter, page 324-350 |
Author: F. Etayo, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Unit Quaternion Integral Curve: A New Type Of Fair Free-Form Curves, page 39-58 |
Author: K. T. Miura | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
U.S. Picks new encryption standard* better software with open source* taking a SIP of internet telephony, page 20 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Researchess develop new search techniques* fake networks decoy hackers* vendors begin laser networking, page 19 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|