Your search for 16108 returns 5993 document(s) |
Hiding biometric data, page 1494 |
Author: A.K. Jain | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Random Structures & Algorithms |
Call Number: [8 (1996): 1-4, 9 (1996): 1-4, 10 (1997): 1-4, 11 (1977): 1-4] | Type: Jurnal/ Majalah
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Conditional random fields: a review |
Author: Dewi Yanti Liliana; | Call Number: TR-CSUI-004-2016 | Type: Technical Report
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Model Driven Security: From UML Models to Access Control Infrastructures, page 39-91 |
Author: D. Basin, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Streaming media initiative may be stymied* is the internet an energy hog* two groups to focus on nertwork security, page 19 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network address translators: effects on security protocols and applications in the TCP/IP stack, page 42 |
Author: Shiuh-Pyang | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Circuits of power in creating de jure standards: shaping an international information systems security standard, page 413-438 |
Author: James Backhouse, Carol W. Hsu, and Leiser Silva | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Tuning Out Security Warnings: A Longitudinal Examination of Habituation Through fMRI, Eye Tracking, and Field Experiments, Page 355-380 |
Author: Anthony Vance, Jeffrey L. Jenkins, Bonnie Brinton Anderson, Daniel K. Bjornn, and C. Brock Kirwan | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography: a new dimension in computer data security: a guide for the design and implementation of secure systems |
Author: Meyer, Carl H.; | Call Number: 652.8 Mey c | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Moving towards pci dss 3.0 compliace: a case study of credit card data security audit in an online pyment company |
Author: muhammad r sihab; febrianamisdianti; | Call Number: sem-320 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|