Search Result Save to File Save as CSV
Your search for 14512 returns 4935 document(s)
Security enhancement of route optimization in mobile IPv6 networks, page 1-19
Author: A. Mehdizadeh; S. Khatun; B. M. Ali; R.S.A. Abdullah; G. Kurup | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Proactive versus reactive security investments in the healthcare sector, page 451-471
Author: Juhee Kwon and M. Eric Johnson | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Quality competition and market segmentation in the security software market, page 589-606
Author: Debabrata Dey, Atanu Lahiri, and Guoying Zhang | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Toward a Unified Model of Information Security Policy Compliance, Page 285-311
Author: Gregory D. Moody, Mikko Siponen, and Seppo Pahnila | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Full stack developer internship di magna solusi indonesia
Author: Aulia Radityatama Suhendra; | Call Number: KP-3708 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Full-stack intern di digi asia bios
Author: Ryan Karyadiputera; | Call Number: KP-3664 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan Websites Tjetak dengan Menggunakan Technology Stack Tjetak
Author: Muhammad Rasyid Gatra Wijaya; | Call Number: KP-3221 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan Aplikasi Migo Sebagai Full Stack Developer Intern
Author: Vincent Yovian; | Call Number: KP-3757 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Audit, Analisa dan Perancangan Infrastruktur Network Security studi kasus: Mobil Internet Services Company
Author: Eko Kurniawan; | Call Number: T-0357 (Softcopy T-007) | Edition: 2003 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Device authentication/ authorization protocol for home network in next generation security, (LNCS-Lecture Notes in Computer Science 5576) Hal 760-768
Author: Jong Sik Moon; Deok Gyu Lee; Im-Yeong Lee; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   13 14 15 16 17 18 19 20 21 22  Next