Search Result Save to File Save as CSV
Your search for 25772 returns 46 document(s)
Data Security using Block Cipher data Encryption Standard (DES) And Stream Cipher Ron Code 4 (RC4) (A-68 -- A-73)
Author: Victor Amrizal Herlino Nanang Chandra Wirawan; | Call Number: SEM-316 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Insiders’ Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors, page 1189-1210
Author: Clay Posey, Tom L. Roberts, Paul Benjamin Lowry, Rebecca J. Bennett, and James F. Courtney | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Intellectual-property protection opnes path for e-commerce, page 14
Author: George Lawton | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
A Distributed community approach for protection resources in digital ecosystem, Hal. 95-100
Author: Hung Pranata, Geoff Skinner, Rukshan Athauda; | Call Number: SEM-301 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Using public key technology-issues of binding and protection, Hal. 111-122
Author: James M. Galvin; Sandra L. Murphy; | Call Number: SEM-216 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Novel protection algorithm for survivable hybrid wireles-optical broadband access network
Author: Bo Gong; Yejun Liu, Lei Guo; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Study on management strategies of development and protection of Chinese island's ecosystem, Hal. 3082-3084
Author: Tang Wei; Wang Peigang; Song Shilin; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Data protection in health information systems considerations and guidelines/ edited by G.G.Griesser
Call Number: 651.504 261 Dat | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Data Protection And Employee Behavior: The Role Of Information Systems Security Culture (516-520)
Author: Lena Connolly Michael Lang; | Call Number: SEM-329 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Research on Environmental Protection Strategy of Chinese Rural Area (V2-55--V2-57)
Author: Zhaohao Xu Yan Zhang; | Call Number: SEM-328 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5  Next