Your search for 14512 returns 4935 document(s) |
A network security policy framework using multi-attribute decision making model, 116-120 |
Author: Song Yu, He Xiaoli, Ye Xiaotong, Liang Jinming, He Xianbo; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Neural Network Based Transient Stability Model to Analyze The Security of Java-Bali 500 kV Power System (hal 1301-1306) |
Author: Irrine Budi Sulistiawati, Muhammad Abdillah, Adi Soeprijanto; | Call Number: SEM-368 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied cryptography and network security: first international conf. ACNS 2003 Kunning, China, October 16-19, 2003 Proceedings |
Author: Zhou, Jianying; | Call Number: 005.8 Zho a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Inside network perimeter security: the definitve guide to firewalls, VPNs, routers, and instruction Detection |
Author: Northcutt, Stephen...[et. al.]; | Call Number: 005.8 Ins | Edition: 2003 | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied cryptography and network security : first internal conference ACNS 2003, Kunnings, China, October 16-19, 2003, Proceedings |
Author: Zhou, Jianjing; | Call Number: 005.8 Zho o | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Perancangan kerangka kerja network security operator center: studi kasus Kementerian Luar Negeri |
Author: Fitri Wijayanti; | Call Number: KA-1457 (Softcopy KA-1445) MAK KA-1097 | Edition: 2021 | Type: Karya Akhir (KA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security Challenges in Wireless Mesh Network Deployment and User Authentication (EAP) Method (V1-333 -- V1-337) |
Author: Min Lin
Shaoyong Chen; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
AHP Application In Contemporary Nepalese Issues (42) |
Author: Shashi Bhattarai
Prabal Sapkota; | Call Number: SEM-311 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Hierachical N-body methods on shared address space multiprocessors, Hal. 313-315 |
Author: Chris Holt; Jaswinder Pal Signh; | Call Number: SEM-229 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Distributed algorithms and protocols |
Author: Raynal, Michael; | Call Number: 004.36 Ray d | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|