Your search for 35508 returns 4912 document(s) |
Secure wireles sensor network: solusi efisiensi sistem keamanan ubiquitous sensor network, HAL. 421-426 |
Author: Kholif Faiz Ma'ruf; Arif Rahman Hakim; | Call Number: SEM-292 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Comparison and analysis of distributed algorithms for wireless sensor network, Hal. 3206-3209 |
Author: Fnaglu Ning; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An overlook on routing techniques in wireless sensor neworks, HAL. 940-945 |
Author: S. Vijaynand; R.M. Suresh; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Routing protocols in wireles sensor network, HAL. 240-246 |
Author: MS. Kunjal B. Joshi; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Built-in security feature of sensor network, HAL. 440 - 447 |
Author: Kalpana Sharma; Vikash Varum; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Desain dan implementasi prototype aplikasi packet analyzer pada wireless sensor network |
Author: Ryzky Yudha; | Call Number: SK-0976 (Softcopy SK-457) | Type: Skripsi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network security principles and practices: expert solutions for securing network infrastructures and VPNs/ Saadat Malik |
Author: Malik Saadat; | Call Number: 005. 8 Mal n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer network security: second internaitonal workshop on mathematical methods, models and architectures for computer network security MMM-ACNS 2003 St Petersburg, Russia, Sept' 2003, Proceeding |
Call Number: 005.8 Com | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Inside network perimeter security: the definitve guide to firewalls, VPNs, routers, and instruction Detection |
Author: Northcutt, Stephen...[et. al.]; | Call Number: 005.8 Ins | Edition: 2003 | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Perancangan implementasi sistem keamanan jaringan berbasis VPN pada sebuah perusahaan studi kasus: PT DANAREKSA |
Author: Riska Adriyani; | Call Number: T-0326 (Softcopy T-0148) | Edition: 2002 | Type: Tesis
|
Find Similar |
Add To Favorites |
Detail in New Window
|