Search Result Save to File Save as CSV
Your search for 15156 returns 3785 document(s)
Benchmark untuk web security, page 18
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
State of IT security 2006, page 26
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Initiative takes long view of tele-immersion* will wireless be IPv6's killer app? , page 28
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Strategi manajemen perubahan untuk mendukung implementasi information security management system : studi kasus Bank XYZ Divisi Teknologi Informasi
Author: Farida Noorseptiyanti; | Call Number: KA-218 (Softcopy KA-217) | Edition: 2011 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Survivability assessment modeling a recovery process, HAL. C.163-C.166
Author: Irving Vitra Paputungan, Azween abdullah; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Automatic proof of survivability compliance - approach and techniques, 92-96
Author: Yanjun Zuo; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Verifying Security Protocols with Brutus, page 443-487
Author: E. M. Clarke, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Security system-awareness=0, page 45
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Will PKI become a key to online security?, page 13
Author: Sixto Ortiz | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Facing the challenge of wireless security, Page 16
Author: Sandra Kay Miller | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next