Search Result Save to File Save as CSV
Your search for 25347 returns 3902 document(s)
Unix system security a guide for users and systems administrators
Author: Curry, David A.; | Call Number: 005.43 Cur u | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Towards risk-oriented security ontology, HAL. 170 - 174
Author: Basuki Rahmad, Suhono H. Supangkat; Jaka Sembiring; Kridanto Surendro; | Call Number: SEM-294 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Data security through graphical authentication schemes, HAL. 1013-1024
Author: M.N. Djoja; Naveen Kumar; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Survey of vulnerability and security of mobile ad hoc networks
Author: Siddharth S Rautaray and Sanjeev Sharma; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Built-in security feature of sensor network, HAL. 440 - 447
Author: Kalpana Sharma; Vikash Varum; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Intelligent scheme of data security and message transmission, HAL. 453-455
Author: Prasun Chakrabarti; Shambit Saha, Ranjan Lahiri; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Enforcing security in .net based web services, HAL. 996-1001
Author: E. George Dharma Prakash Raj; N. Ssikuladevi; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Solaris SunShield basic security modula guide
Call Number: 005.43 Sol | Type: Buku Manual
Find Similar |  Add To Favorites |  Detail in New Window 
A Scalable architecture for classifying network security threats, Hal. 3061-3064
Author: Jian Tang; Dongxia Wang; Liang Ming and Xiang Li; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Survey of security issues in opportunistic network, Hal. 3092-3096
Author: Xu Xiang; | Call Number: Sem-302 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   15 16 17 18 19 20 21 22 23 24  Next