Your search for 14512 returns 4953 document(s) |
Implementation of the typed call-by-value -calculus using a stack of regions,Hal 188-201 |
Author: Mads Tofte; Jean-Pierre Talpin; | Call Number: SEM-198 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A method of detecting stack overflow vulnerability of binary code of a component, 212-216 |
Author: Hang Zhengbo, Yang Hebiao, Da Wei; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Menjadi full stack developer untuk pengembangan aplikasi belajar daring sinaungomah |
Author: Mika Dabelza Abi; | Call Number: KP-3376 | Type: Kerja Praktek (KP)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Model Driven Security: From UML Models to Access Control Infrastructures, page 39-91 |
Author: D. Basin, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Streaming media initiative may be stymied* is the internet an energy hog* two groups to focus on nertwork security, page 19 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Circuits of power in creating de jure standards: shaping an international information systems security standard, page 413-438 |
Author: James Backhouse, Carol W. Hsu, and Leiser Silva | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Tuning Out Security Warnings: A Longitudinal Examination of Habituation Through fMRI, Eye Tracking, and Field Experiments, Page 355-380 |
Author: Anthony Vance, Jeffrey L. Jenkins, Bonnie Brinton Anderson, Daniel K. Bjornn, and C. Brock Kirwan | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
When Do IT Security Investments Matter? Accounting for the Influence of Institutional Factors in the Context of Healthcare Data Breaches, Page 893-916 |
Author: Corey M. Angst, Emily S. Block, John D’Arcy, and Ken Kelley | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Transmisi Citra Menggunakan Pengkodean Gabungan SPIHT-LDPC (42) |
Author: M. Agus Zainuddin
Wirawan; | Call Number: SEM-307 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer networking with internet protocols and technology |
Author: Stallings William; | Call Number: 004.68 Sta c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|