Search Result Save to File Save as CSV
Your search for 14512 returns 4953 document(s)
Implementation of the typed call-by-value -calculus using a stack of regions,Hal 188-201
Author: Mads Tofte; Jean-Pierre Talpin; | Call Number: SEM-198 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A method of detecting stack overflow vulnerability of binary code of a component, 212-216
Author: Hang Zhengbo, Yang Hebiao, Da Wei; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Menjadi full stack developer untuk pengembangan aplikasi belajar daring sinaungomah
Author: Mika Dabelza Abi; | Call Number: KP-3376 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Model Driven Security: From UML Models to Access Control Infrastructures, page 39-91
Author: D. Basin, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Streaming media initiative may be stymied* is the internet an energy hog* two groups to focus on nertwork security, page 19
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Circuits of power in creating de jure standards: shaping an international information systems security standard, page 413-438
Author: James Backhouse, Carol W. Hsu, and Leiser Silva | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Tuning Out Security Warnings: A Longitudinal Examination of Habituation Through fMRI, Eye Tracking, and Field Experiments, Page 355-380
Author: Anthony Vance, Jeffrey L. Jenkins, Bonnie Brinton Anderson, Daniel K. Bjornn, and C. Brock Kirwan | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
When Do IT Security Investments Matter? Accounting for the Influence of Institutional Factors in the Context of Healthcare Data Breaches, Page 893-916
Author: Corey M. Angst, Emily S. Block, John D’Arcy, and Ken Kelley | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Transmisi Citra Menggunakan Pengkodean Gabungan SPIHT-LDPC (42)
Author: M. Agus Zainuddin Wirawan; | Call Number: SEM-307 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Computer networking with internet protocols and technology
Author: Stallings William; | Call Number: 004.68 Sta c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   18 19 20 21 22 23 24 25 26 27  Next