Your search for 27989 returns 3395 document(s) |
The international handbook on computer crime |
Author: Sieber, Ulrich P.; | Call Number: 364.168 Sie i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
2011 International conference on advanced computer science and information systems (Proceedings) ICACSIS 2011 Mercure Convention Center, Jakarta December 17th -18th ,2011 |
Call Number: SEM-301 | Type: Prosiding Seminar
|
Find Similar |
Add To Favorites |
Detail in New Window
|
2012 International conference on advanced computer science and information systems (ICACSIS 2012) Depok, December 1st and 2nd 2012 Crystal of knowledge building Universitas Indonesia |
Call Number: SEM-304 A | Type: Prosiding Seminar
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Proceedings 2011 4th IEEE International Conference on computer science and information technology Juni 10-12, 2011 Chengdu, China (ICCSIT 2011) |
Call Number: SEM-347 | Type: Prosiding Seminar
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Icacsis 2019 11th international conference on advanced computer science and information systems Nusa Dua, Bali, Indonesia October 12-13, 2019 |
Call Number: SEM-371 | Type: Prosiding Seminar
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network security essentials applications and standards 2nd ed. |
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and network security: principles and practice 3rd ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Built-in security feature of sensor network, HAL. 440 - 447 |
Author: Kalpana Sharma; Vikash Varum; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Scalable architecture for classifying network security threats, Hal. 3061-3064 |
Author: Jian Tang; Dongxia Wang; Liang Ming and Xiang Li; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Survey of security issues in opportunistic network, Hal. 3092-3096 |
Author: Xu Xiang; | Call Number: Sem-302 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|