Search Result Save to File Save as CSV
Your search for 14512 returns 4935 document(s)
The Distinctiveness of a parameterized neighborhood: extraction and applications, page 1215
Author: Y.C. Chenn | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
The trace transform and its applications, page 811
Author: A. Kadyrov | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Wireless local area network: tak sekadar mobilitas, page 30
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
SAFKASI: A Security Mechanism for Language-Based Systems, page 341-378
Author: Dan S. Wallach, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Digital government security infrastructure design challenges, page 66
Author: James Joshi | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Trust-based security in pervasive computing environments, page 154
Author: Lalana Kagal | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Technology standards pros aid homeland security, page 104
Author: Kate M. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Enterprise security di hotspot best practices untuk para pekerja mobile, page 15
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
A Modified random perturbation method for database security, page 47
Author: Tendick, P. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Correlated failures, diversification, and information security risk management, page 397-422
Author: Pei-yu Chen, Gaurav Kataria, and Ramayya Krishnan | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   12 13 14 15 16 17 18 19 20 21  Next