Your search for 25347 returns 3902 document(s) |
Open source security: oportunity or oxymoron, page 18 |
Author: Goerge Lawton | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Managing software security risks, page 99 |
Author: Gary M. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Trusted PC: skin-deep security, page 103 |
Author: Andrew B.W. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
What makes security technologies relevant?, page 38 |
Author: Li Gong | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Job security vs gaji, page 16 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Perubahan paradigma dari security menuju survivability, page 28 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security of random data perturbation methods, page 487 |
Author: Muralidhar | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
ATM control, audit and security/ Chester M. WInters |
Author: Winters, Chester M.; | Call Number: 005.8 Win a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Enterprise security architecture: a business-driven approach |
Author: Sherwood, John; | Call Number: 005.8 She e | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and network security: principles and practice 3rd ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|