Search Result Save to File Save as CSV
Your search for 25203 returns 4752 document(s)
Embedded security: challenges and concerns, page 40
Author: William A A. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Security: technical, social, and legal challeges, page 109
Author: Bill A. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Open source security: oportunity or oxymoron, page 18
Author: Goerge Lawton | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Managing software security risks, page 99
Author: Gary M. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
The Trusted PC: skin-deep security, page 103
Author: Andrew B.W. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
What makes security technologies relevant?, page 38
Author: Li Gong | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Job security vs gaji, page 16
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Perubahan paradigma dari security menuju survivability, page 28
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Security of random data perturbation methods, page 487
Author: Muralidhar | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
2-D Face Recognition System Using Cylindrical-Hidden Layer Neural Networks and Its Optimization Through Genetic Algorithms (118-123)
Author: Benyamin Kusumoputro; | Call Number: SEM-306 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next