Your search for 14512 returns 4935 document(s) |
The Distinctiveness of a parameterized neighborhood: extraction and applications, page 1215 |
Author: Y.C. Chenn | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The trace transform and its applications, page 811 |
Author: A. Kadyrov | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Wireless local area network: tak sekadar mobilitas, page 30 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
SAFKASI: A Security Mechanism for Language-Based Systems, page 341-378 |
Author: Dan S. Wallach, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Digital government security infrastructure design challenges, page 66 |
Author: James Joshi | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Trust-based security in pervasive computing environments, page 154 |
Author: Lalana Kagal | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Technology standards pros aid homeland security, page 104 |
Author: Kate M. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Enterprise security di hotspot best practices untuk para pekerja mobile, page 15 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Modified random perturbation method for database security, page 47 |
Author: Tendick, P. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Correlated failures, diversification, and information security risk management, page 397-422 |
Author: Pei-yu Chen, Gaurav Kataria, and Ramayya Krishnan | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|