Search Result
Save to File
Your search for
14512
returns
4935
document(s)
Open source security: oportunity or oxymoron, page 18
Author: Goerge Lawton | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Managing software security risks, page 99
Author: Gary M. | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
The Trusted PC: skin-deep security, page 103
Author: Andrew B.W. | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
What makes security technologies relevant?, page 38
Author: Li Gong | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Job security vs gaji, page 16
Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Perubahan paradigma dari security menuju survivability, page 28
Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Security of random data perturbation methods, page 487
Author: Muralidhar | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Predictions for the core of the network, page 60
Author: Ross Callon | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Network security principles and practices: expert solutions for securing network infrastructures and VPNs/ Saadat Malik
Author: Malik Saadat; | Call Number: 005. 8 Mal n | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Analisa kinerja address resolution protocol spoofing
Author: Teofilus Gabe Sidauruk; | Call Number: SK-1069 (Softcopy SK-550) Source Code SK-402 | Type: Skripsi
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
10
11
12
13
14
15
16
17
18
19
Next