Search Result Save to File Save as CSV
Your search for 27889 returns 3695 document(s)
Improved location acquisition algorithms for the location-based alert service, (LNCS-Lecture Notes in Computer Science 5576) Hal. 461-470
Author: So Young Kang, Jin-Wong, Kwang Jo Lee, Ju-Hee Lee, Ji-Hoon Kim, Shung-Bong Yang; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Model Driven Security: From UML Models to Access Control Infrastructures, page 39-91
Author: D. Basin, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Streaming media initiative may be stymied* is the internet an energy hog* two groups to focus on nertwork security, page 19
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Network address translators: effects on security protocols and applications in the TCP/IP stack, page 42
Author: Shiuh-Pyang | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Circuits of power in creating de jure standards: shaping an international information systems security standard, page 413-438
Author: James Backhouse, Carol W. Hsu, and Leiser Silva | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Tuning Out Security Warnings: A Longitudinal Examination of Habituation Through fMRI, Eye Tracking, and Field Experiments, Page 355-380
Author: Anthony Vance, Jeffrey L. Jenkins, Bonnie Brinton Anderson, Daniel K. Bjornn, and C. Brock Kirwan | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
When Do IT Security Investments Matter? Accounting for the Influence of Institutional Factors in the Context of Healthcare Data Breaches, Page 893-916
Author: Corey M. Angst, Emily S. Block, John D’Arcy, and Ken Kelley | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Hacker launches cyberattack from security site* new bus technology boosts performance* peer-to-peer goes hand to hand, page 23
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
What Users Do Besides Problem-Focused Coping When Facing IT Security Threats: An Emotion-Focused Coping Perspective, Page 373-394
Author: Huigang Liang, Yajiong Xue, Alain Pinsonneault, and Yu “Andy” Wu | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Security monitoring
Author: Fry, Chris; | Call Number: 005.8 Fry s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next