Search Result Save to File Save as CSV
Your search for 16108 returns 5993 document(s)
Hiding biometric data, page 1494
Author: A.K. Jain | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Random Structures & Algorithms
Call Number: [8 (1996): 1-4, 9 (1996): 1-4, 10 (1997): 1-4, 11 (1977): 1-4] | Type: Jurnal/ Majalah
Find Similar |  Add To Favorites |  Detail in New Window 
Conditional random fields: a review
Author: Dewi Yanti Liliana; | Call Number: TR-CSUI-004-2016 | Type: Technical Report
Find Similar |  Add To Favorites |  Detail in New Window 
Model Driven Security: From UML Models to Access Control Infrastructures, page 39-91
Author: D. Basin, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Streaming media initiative may be stymied* is the internet an energy hog* two groups to focus on nertwork security, page 19
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Network address translators: effects on security protocols and applications in the TCP/IP stack, page 42
Author: Shiuh-Pyang | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Circuits of power in creating de jure standards: shaping an international information systems security standard, page 413-438
Author: James Backhouse, Carol W. Hsu, and Leiser Silva | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Tuning Out Security Warnings: A Longitudinal Examination of Habituation Through fMRI, Eye Tracking, and Field Experiments, Page 355-380
Author: Anthony Vance, Jeffrey L. Jenkins, Bonnie Brinton Anderson, Daniel K. Bjornn, and C. Brock Kirwan | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography: a new dimension in computer data security: a guide for the design and implementation of secure systems
Author: Meyer, Carl H.; | Call Number: 652.8 Mey c | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Moving towards pci dss 3.0 compliace: a case study of credit card data security audit in an online pyment company
Author: muhammad r sihab; febrianamisdianti; | Call Number: sem-320 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   5 6 7 8 9 10 11 12 13 14  Next