Search Result Save to File Save as CSV
Your search for 27989 returns 3395 document(s)
The international handbook on computer crime
Author: Sieber, Ulrich P.; | Call Number: 364.168 Sie i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
2011 International conference on advanced computer science and information systems (Proceedings) ICACSIS 2011 Mercure Convention Center, Jakarta December 17th -18th ,2011
Call Number: SEM-301 | Type: Prosiding Seminar
Find Similar |  Add To Favorites |  Detail in New Window 
2012 International conference on advanced computer science and information systems (ICACSIS 2012) Depok, December 1st and 2nd 2012 Crystal of knowledge building Universitas Indonesia
Call Number: SEM-304 A | Type: Prosiding Seminar
Find Similar |  Add To Favorites |  Detail in New Window 
Proceedings 2011 4th IEEE International Conference on computer science and information technology Juni 10-12, 2011 Chengdu, China (ICCSIT 2011)
Call Number: SEM-347 | Type: Prosiding Seminar
Find Similar |  Add To Favorites |  Detail in New Window 
Icacsis 2019 11th international conference on advanced computer science and information systems Nusa Dua, Bali, Indonesia October 12-13, 2019
Call Number: SEM-371 | Type: Prosiding Seminar
Find Similar |  Add To Favorites |  Detail in New Window 
Network security essentials applications and standards 2nd ed.
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography and network security: principles and practice 3rd ed.
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Built-in security feature of sensor network, HAL. 440 - 447
Author: Kalpana Sharma; Vikash Varum; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Scalable architecture for classifying network security threats, Hal. 3061-3064
Author: Jian Tang; Dongxia Wang; Liang Ming and Xiang Li; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Survey of security issues in opportunistic network, Hal. 3092-3096
Author: Xu Xiang; | Call Number: Sem-302 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   4 5 6 7 8 9 10 11 12 13  Next