Your search for 16108 returns 6026 document(s) |
Consistency of transactions and random batch, page 397 |
Author: Rudolf Bayer | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Polling an image for circles by random lines, page 125 |
Author: Y.C. Cheng | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security alert, page 104 |
Author: George K. Campbell | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and Data Security |
Author: Denning, Dorothy E.; | Call Number: 005.8 Den c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
When Do IT Security Investments Matter? Accounting for the Influence of Institutional Factors in the Context of Healthcare Data Breaches, Page 893-916 |
Author: Corey M. Angst, Emily S. Block, John D’Arcy, and Ken Kelley | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs, page 1892 |
Author: A.B..J. Teoh A. Goh | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Benchmark untuk web security, page 18 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
State of IT security 2006, page 26 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Memahami modul enkripsi dan security data/ |
Call Number: 005.8 Mem (MTI SLB) | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security issues in data warehouseing, HAL. 346-351 |
Author: Kunjal B. Joshi; | Call Number: SEM-291 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|