Your search for 15156 returns 3785 document(s) |
Benchmark untuk web security, page 18 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
State of IT security 2006, page 26 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Initiative takes long view of tele-immersion* will wireless be IPv6's killer app? , page 28 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Strategi manajemen perubahan untuk mendukung implementasi information security management system : studi kasus Bank XYZ Divisi Teknologi Informasi |
Author: Farida Noorseptiyanti; | Call Number: KA-218 (Softcopy KA-217) | Edition: 2011 | Type: Karya Akhir (KA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Survivability assessment modeling a recovery process, HAL. C.163-C.166 |
Author: Irving Vitra Paputungan, Azween abdullah; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Automatic proof of survivability compliance - approach and techniques, 92-96 |
Author: Yanjun Zuo; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Verifying Security Protocols with Brutus, page 443-487 |
Author: E. M. Clarke, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security system-awareness=0, page 45 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Will PKI become a key to online security?, page 13 |
Author: Sixto Ortiz | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Facing the challenge of wireless security, Page 16 |
Author: Sandra Kay Miller | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|