Your search for 27889 returns 3695 document(s) |
Improved location acquisition algorithms for the location-based alert service, (LNCS-Lecture Notes in Computer Science 5576) Hal. 461-470 |
Author: So Young Kang, Jin-Wong, Kwang Jo Lee, Ju-Hee Lee, Ji-Hoon Kim, Shung-Bong Yang; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Model Driven Security: From UML Models to Access Control Infrastructures, page 39-91 |
Author: D. Basin, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Streaming media initiative may be stymied* is the internet an energy hog* two groups to focus on nertwork security, page 19 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network address translators: effects on security protocols and applications in the TCP/IP stack, page 42 |
Author: Shiuh-Pyang | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Circuits of power in creating de jure standards: shaping an international information systems security standard, page 413-438 |
Author: James Backhouse, Carol W. Hsu, and Leiser Silva | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Tuning Out Security Warnings: A Longitudinal Examination of Habituation Through fMRI, Eye Tracking, and Field Experiments, Page 355-380 |
Author: Anthony Vance, Jeffrey L. Jenkins, Bonnie Brinton Anderson, Daniel K. Bjornn, and C. Brock Kirwan | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
When Do IT Security Investments Matter? Accounting for the Influence of Institutional Factors in the Context of Healthcare Data Breaches, Page 893-916 |
Author: Corey M. Angst, Emily S. Block, John D’Arcy, and Ken Kelley | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Hacker launches cyberattack from security site* new bus technology boosts performance* peer-to-peer goes hand to hand, page 23 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
What Users Do Besides Problem-Focused Coping When Facing IT Security Threats: An Emotion-Focused Coping Perspective, Page 373-394 |
Author: Huigang Liang, Yajiong Xue, Alain Pinsonneault, and Yu “Andy” Wu | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security monitoring |
Author: Fry, Chris; | Call Number: 005.8 Fry s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|