Your search for 25347 returns 3902 document(s) |
Unix system security a guide for users and systems administrators |
Author: Curry, David A.; | Call Number: 005.43 Cur u | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Towards risk-oriented security ontology, HAL. 170 - 174 |
Author: Basuki Rahmad, Suhono H. Supangkat; Jaka Sembiring; Kridanto Surendro; | Call Number: SEM-294 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Data security through graphical authentication schemes, HAL. 1013-1024 |
Author: M.N. Djoja; Naveen Kumar; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Survey of vulnerability and security of mobile ad hoc networks |
Author: Siddharth S Rautaray and Sanjeev Sharma; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Built-in security feature of sensor network, HAL. 440 - 447 |
Author: Kalpana Sharma; Vikash Varum; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Intelligent scheme of data security and message transmission, HAL. 453-455 |
Author: Prasun Chakrabarti; Shambit Saha, Ranjan Lahiri; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Enforcing security in .net based web services, HAL. 996-1001 |
Author: E. George Dharma Prakash Raj; N. Ssikuladevi; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Solaris SunShield basic security modula guide |
Call Number: 005.43 Sol | Type: Buku Manual
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Scalable architecture for classifying network security threats, Hal. 3061-3064 |
Author: Jian Tang; Dongxia Wang; Liang Ming and Xiang Li; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Survey of security issues in opportunistic network, Hal. 3092-3096 |
Author: Xu Xiang; | Call Number: Sem-302 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|