Your search for 31025 returns 5379 document(s) |
User autentification schemes for mobile and handheld devices, HAL. 136-143 |
Author: M.N. Doja; Naveen Kumar; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Data security through graphical authentication schemes, HAL. 1013-1024 |
Author: M.N. Djoja; Naveen Kumar; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Verifikasi protokol otentikasi Horn-Preneel menggunakan A VISPA (Automated Validation of Internet Security Protocols and Applications) |
Author: Ilham Kurnia; | Call Number: SK-0618 (Softkopi SK-99) Source Code SK-88 | Type: Skripsi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Inside network perimeter security: the definitve guide to firewalls, VPNs, routers, and instruction Detection |
Author: Northcutt, Stephen...[et. al.]; | Call Number: 005.8 Ins | Edition: 2003 | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied cryptography and network security : first internal conference ACNS 2003, Kunnings, China, October 16-19, 2003, Proceedings |
Author: Zhou, Jianjing; | Call Number: 005.8 Zho o | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analisa SI/TI security pada BPR/BKK pasca merger: studi kasus Bank PD. BPR BKK Talang merger |
Author: I Nyoman Jamin; | Call Number: KA-114 (Softcopy KA-114) | Edition: 2011 | Type: Karya Akhir (KA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer/ D.W. Davies |
Author: Davies, Donald Watts; | Call Number: 384 Dav s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer security risk analysis and control a guide for the dp manager |
Author: Wong, KK; | Call Number: 658.47 Won r | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer forensics: computer crime scene investigation |
Author: Vacca, John R.; | Call Number: 363.259 68 Vac c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer forensics: computer crime scene investigation |
Author: Vacca, John R.; | Call Number: 363.259 68 Vac c | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|