Search Result Save to File Save as CSV
Your search for 27989 returns 3395 document(s)
Proceedings of the fifth international conference on computer communication/ edited Jack Salz
Call Number: SEM-121 | Type: Prosiding Seminar
Find Similar |  Add To Favorites |  Detail in New Window 
Proceedings the 19th annual international symposium on computer architecture, May 19-21, 1992
Call Number: SEM-141 | Type: Prosiding Seminar
Find Similar |  Add To Favorites |  Detail in New Window 
Audit, Analisa dan Perancangan Infrastruktur Network Security studi kasus: Mobil Internet Services Company
Author: Eko Kurniawan; | Call Number: T-0357 (Softcopy T-007) | Edition: 2003 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Network address translators: effects on security protocols and applications in the TCP/IP stack, page 42
Author: Shiuh-Pyang | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
A network security policy framework using multi-attribute decision making model, 116-120
Author: Song Yu, He Xiaoli, Ye Xiaotong, Liang Jinming, He Xianbo; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Neural Network Based Transient Stability Model to Analyze The Security of Java-Bali 500 kV Power System (hal 1301-1306)
Author: Irrine Budi Sulistiawati, Muhammad Abdillah, Adi Soeprijanto; | Call Number: SEM-368 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Inside network perimeter security: the definitve guide to firewalls, VPNs, routers, and instruction Detection
Author: Northcutt, Stephen...[et. al.]; | Call Number: 005.8 Ins | Edition: 2003 | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Internet & TCP/IP network security: securing protocols and applications/Uday I. Prabai, Vijay K. Garbani
Author: Pabrai, Uday I.; | Call Number: 005.8 Pab i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Applied cryptography and network security : first internal conference ACNS 2003, Kunnings, China, October 16-19, 2003, Proceedings
Author: Zhou, Jianjing; | Call Number: 005.8 Zho o | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan kerangka kerja network security operator center: studi kasus Kementerian Luar Negeri
Author: Fitri Wijayanti; | Call Number: KA-1457 (Softcopy KA-1445) MAK KA-1097 | Edition: 2021 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   15 16 17 18 19 20 21 22 23 24  Next