Search Result Save to File Save as CSV
Your search for 16108 returns 6026 document(s)
Consistency of transactions and random batch, page 397
Author: Rudolf Bayer | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Polling an image for circles by random lines, page 125
Author: Y.C. Cheng | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Security alert, page 104
Author: George K. Campbell | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography and Data Security
Author: Denning, Dorothy E.; | Call Number: 005.8 Den c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
When Do IT Security Investments Matter? Accounting for the Influence of Institutional Factors in the Context of Healthcare Data Breaches, Page 893-916
Author: Corey M. Angst, Emily S. Block, John D’Arcy, and Ken Kelley | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs, page 1892
Author: A.B..J. Teoh A. Goh | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Benchmark untuk web security, page 18
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
State of IT security 2006, page 26
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Memahami modul enkripsi dan security data/
Call Number: 005.8 Mem (MTI SLB) | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Security issues in data warehouseing, HAL. 346-351
Author: Kunjal B. Joshi; | Call Number: SEM-291 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next