Your search for 25772 returns 46 document(s) |
Protection and security on the information superhighway |
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Protection and security on the information superhigway |
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
IP Protection and restoration, page 97 |
Author: Christopher M. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Protection techniques from information extraction |
Author: Greco, Gianluigi; Ianni, Giovambattista | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
E-mail protection advances with new technologies , page 21 |
Author: Sixto Ortiz | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Copy protection technology is doomed, page 48 |
Author: Dan S.W. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Data protection laws-a transnational perspective, HAL. 1042-1048 |
Author: Amir Mahshwari; Akhil Prasad; Aditi Agarwata; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Copy protection for high-definition baseband video, Hal. 174-177 |
Author: David A. Barr; | Call Number: SEM-259 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Techniques and applications of digital watermarking and content protection |
Author: Arnold, Michael; | Call Number: 005.8 Arn t | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Implementasi rc4 stream cipher untuk keamanan basis data ( Hal 64 - 67 ) |
Author: Wahyu Hari Haji, Slamet Mulyono; | Call Number: SEM - 365 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|