Your search for 16108 returns 6043 document(s) |
What makes security technologies relevant?, page 38 |
Author: Li Gong | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Job security vs gaji, page 16 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Perubahan paradigma dari security menuju survivability, page 28 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Data security through graphical authentication schemes, HAL. 1013-1024 |
Author: M.N. Djoja; Naveen Kumar; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Intelligent scheme of data security and message transmission, HAL. 453-455 |
Author: Prasun Chakrabarti; Shambit Saha, Ranjan Lahiri; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Tutorial: the security of data in networks/ Donald W. Davies |
Call Number: 005.8 Dav t | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network security: data and voice communications/Fred Simonds |
Author: Simonds, Fred; | Call Number: 005.8 Sim n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Conceptual Study Of Data Governance For Food Security |
Author: Dewi Puspasari; | Call Number: TR-CSUI/018 (015-020)2019 | Type: Technical Report
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Get ready for agile methods, with care, page 84 |
Author: Barry Boebm | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Methods for information server selection, page 40 |
Author: David H. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|