Search Result Save to File Save as CSV
Your search for 16108 returns 6043 document(s)
What makes security technologies relevant?, page 38
Author: Li Gong | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Job security vs gaji, page 16
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Perubahan paradigma dari security menuju survivability, page 28
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Data security through graphical authentication schemes, HAL. 1013-1024
Author: M.N. Djoja; Naveen Kumar; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Intelligent scheme of data security and message transmission, HAL. 453-455
Author: Prasun Chakrabarti; Shambit Saha, Ranjan Lahiri; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Tutorial: the security of data in networks/ Donald W. Davies
Call Number: 005.8 Dav t | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Network security: data and voice communications/Fred Simonds
Author: Simonds, Fred; | Call Number: 005.8 Sim n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
A Conceptual Study Of Data Governance For Food Security
Author: Dewi Puspasari; | Call Number: TR-CSUI/018 (015-020)2019 | Type: Technical Report
Find Similar |  Add To Favorites |  Detail in New Window 
Get ready for agile methods, with care, page 84
Author: Barry Boebm | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Methods for information server selection, page 40
Author: David H. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next