Search Result Save to File Save as CSV
Your search for 15156 returns 3785 document(s)
Tuning Out Security Warnings: A Longitudinal Examination of Habituation Through fMRI, Eye Tracking, and Field Experiments, Page 355-380
Author: Anthony Vance, Jeffrey L. Jenkins, Bonnie Brinton Anderson, Daniel K. Bjornn, and C. Brock Kirwan | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
When Do IT Security Investments Matter? Accounting for the Influence of Institutional Factors in the Context of Healthcare Data Breaches, Page 893-916
Author: Corey M. Angst, Emily S. Block, John D’Arcy, and Ken Kelley | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Manajemen perubahan dan implementasi TI
Author: Riri Satria | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Neural networks for a air-conditioning objects recognition in industrial environments ( hal 24 - 28)
Author: E. Dominguez J.J.Carmona; | Call Number: SEM - 362 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Hybrid AHP/FST Model for Regional Aircraft Evaluation (28)
Author: Giuseppe Bruno Emilio Esposito Andrea Genovese; | Call Number: SEM-311 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
The Development Of A Malacca Straits Oil Spill Response Information System (28)
Author: Surya Afnarius; | Call Number: SEM-307 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Pembangunan Program Pembangkit ITWM Berbasiskan SVG: Pengolahan Kartografi (28)
Author: Surya Afnarius; | Call Number: SEM-307 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
28 GHz Line-Of-Sight Link Propagation Experiment in Surabaya Indonesia (64-67)
Author: Mochamad Salehudin Hendry Aries Amin Yusuf; | Call Number: SEM-247 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Hacker launches cyberattack from security site* new bus technology boosts performance* peer-to-peer goes hand to hand, page 23
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
What Users Do Besides Problem-Focused Coping When Facing IT Security Threats: An Emotion-Focused Coping Perspective, Page 373-394
Author: Huigang Liang, Yajiong Xue, Alain Pinsonneault, and Yu “Andy” Wu | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   3 4 5 6 7 8 9 10 11 12  Next