Your search for 25203 returns 4752 document(s) |
Embedded security: challenges and concerns, page 40 |
Author: William A A. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security: technical, social, and legal challeges, page 109 |
Author: Bill A. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Open source security: oportunity or oxymoron, page 18 |
Author: Goerge Lawton | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Managing software security risks, page 99 |
Author: Gary M. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Trusted PC: skin-deep security, page 103 |
Author: Andrew B.W. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
What makes security technologies relevant?, page 38 |
Author: Li Gong | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Job security vs gaji, page 16 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Perubahan paradigma dari security menuju survivability, page 28 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security of random data perturbation methods, page 487 |
Author: Muralidhar | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
2-D Face Recognition System Using Cylindrical-Hidden Layer Neural Networks and Its Optimization Through Genetic Algorithms (118-123) |
Author: Benyamin Kusumoputro; | Call Number: SEM-306 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|