Your search for 25772 returns 46 document(s) |
Data Security using Block Cipher data Encryption Standard (DES) And Stream Cipher Ron Code 4 (RC4) (A-68 -- A-73) |
Author: Victor Amrizal
Herlino Nanang
Chandra Wirawan; | Call Number: SEM-316 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Insiders’ Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors, page 1189-1210 |
Author: Clay Posey, Tom L. Roberts, Paul Benjamin Lowry, Rebecca J. Bennett, and James F. Courtney | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Intellectual-property protection opnes path for e-commerce, page 14 |
Author: George Lawton | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Distributed community approach for protection resources in digital ecosystem, Hal. 95-100 |
Author: Hung Pranata, Geoff Skinner, Rukshan Athauda; | Call Number: SEM-301 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Using public key technology-issues of binding and protection, Hal. 111-122 |
Author: James M. Galvin; Sandra L. Murphy; | Call Number: SEM-216 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Novel protection algorithm for survivable hybrid wireles-optical broadband access network |
Author: Bo Gong; Yejun Liu, Lei Guo; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Study on management strategies of development and protection of Chinese island's ecosystem, Hal. 3082-3084 |
Author: Tang Wei; Wang Peigang; Song Shilin; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Data protection in health information systems considerations and guidelines/ edited by G.G.Griesser |
Call Number: 651.504 261 Dat | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Data Protection And Employee Behavior: The Role Of Information Systems Security Culture (516-520) |
Author: Lena Connolly
Michael Lang; | Call Number: SEM-329 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Research on Environmental Protection Strategy of Chinese Rural Area (V2-55--V2-57) |
Author: Zhaohao Xu
Yan Zhang; | Call Number: SEM-328 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|