Your search for 25347 returns 3902 document(s) |
Privacy, security, and the information processing industry |
Call Number: SEM-097 | Type: Prosiding Seminar
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Konfigurasi Security Policy Selinux (130-133) |
Author: Jaki Eko Istiyanto
Nurhayati Masthurah; | Call Number: SEM-337 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Infrastructural Map for Information Security (503-512) |
Author: Sabah Al-Fedaghi
Hanaa Alnashwan; | Call Number: SEM-323 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
National security versus data privacy and security: study of personal data privacy and security in Iran, HAL. 1081-1087 |
Author: Hassan Allpour and Ebrahim Kiani Harchegant; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A comparative analysis of PKC and semi-PKC based key management schemes for hierarchical sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal 692-701 |
Author: Ayesha Naureen; Attiya Akram; Rabia Riaz; Ki-Hyung Kim; H. Farooq Ahmed; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Adoption Of Joint Application Design On Fernandez Methodology In The Development Of Knowledge Management System For Teaching Assistant At The Faculty Computer Science, Universitas Indonesia |
Author: Hadiyan Nur Rochman; Dana Indra Sensuse; | Call Number: Mak T Jilid 001-015 (T-1197) (Mak T-009) | Type: Makalah Tesis
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Pengembangan Automated Security Scanner dan Deployment Private Cloud di Lab Security FASILKOM UI (Center for Cyber Security and Cryptography, Universitas Indonesia) |
Author: Gregorius Aprisunnea; | Call Number: KP-3382 | Type: Kerja Praktek (KP)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Pengembangan Automated Security Scanner dan Deployment Sistem Manajemen Pivate Cloud di Lab Security FASILKOM UI (Center for Cyber Security and Cyrptography, Universitas Indonesia) |
Author: Steven Kusuman; | Call Number: KP-3343 | Type: Kerja Praktek (KP)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Verifying Security Protocols with Brutus, page 443-487 |
Author: E. M. Clarke, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Practical unix security/Simson Garfinkel and Gene Spafford |
Author: Garfinkel, Simson; | Call Number: 005.8 Gar p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|