Search Result Save to File Save as CSV
Your search for 25347 returns 3921 document(s)
Trust-based security in pervasive computing environments, page 154
Author: Lalana Kagal | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Wanted: more network-security graduates and research, page 22
Author: Linda Dailey P. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Technology standards pros aid homeland security, page 104
Author: Kate M. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Enterprise security di hotspot best practices untuk para pekerja mobile, page 15
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Microsoft windows security inside out for windows XP and windows 2000
Author: Bott, Ed; | Call Number: 005.8 Bot m | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
A Modified random perturbation method for database security, page 47
Author: Tendick, P. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Security enhancement of route optimization in mobile IPv6 networks, page 1-19
Author: A. Mehdizadeh; S. Khatun; B. M. Ali; R.S.A. Abdullah; G. Kurup | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography and Network security principles and practice 5th ed. (INSTRUCTOR'S MANUAL)
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Instructor's Manual
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography and Network security principles and practice 4th ed. (INSTRUCTOR'S MANUAL)
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Instructor's Manual
Find Similar |  Add To Favorites |  Detail in New Window 
Solaris: Sunshield basic security module guide solaris 2.5
Call Number: 005.43 Sol | Type: Buku Manual
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   20 21 22 23 24 25 26 27 28 29  Next