Search Result Save to File Save as CSV
Your search for 35754 returns 4399 document(s)
Verifikasi protokol otentikasi Horn-Preneel menggunakan A VISPA (Automated Validation of Internet Security Protocols and Applications)
Author: Ilham Kurnia; | Call Number: SK-0618 (Softkopi SK-99) Source Code SK-88 | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Applied cryptography and network security: first international conf. ACNS 2003 Kunning, China, October 16-19, 2003 Proceedings
Author: Zhou, Jianying; | Call Number: 005.8 Zho a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Maximum Linux security : [a hacker's guide to protecting your Linux server and workstation]/ Anonymous
Author: Ray, John; | Call Number: 005.8 Ray m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Applied cryptography and network security : first internal conference ACNS 2003, Kunnings, China, October 16-19, 2003, Proceedings
Author: Zhou, Jianjing; | Call Number: 005.8 Zho o | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Analisa SI/TI security pada BPR/BKK pasca merger: studi kasus Bank PD. BPR BKK Talang merger
Author: I Nyoman Jamin; | Call Number: KA-114 (Softcopy KA-114) | Edition: 2011 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
E-Commerce security strategies: protecting the enterprise
Author: Cameron, Debra; | Call Number: 658.478 Cam e | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Multimedia information extraction advances in vidio audio and imagery analysis for search data mining surveillance and authoring/edited Mark T. Maybury
Call Number: 006.312 Mul | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Studi komparasi apriori, eclat, FP growth dan improved apriori berbasis matrix untuk market basket analysis
Author: Nanang Krisdianto; | Call Number: T-0949 (Softcopy T-0607) Source code T-0118 | Edition: 2011 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Information security management handbook 5th ed/ Harold Tipton F.
Call Number: 658.055 8 Inf | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan model arsitektur keamanan informasi pada data center pusat dan sarana informatika Kementerian Komunikasi dan Informatika
Author: Muhammad Fauzi Rais; | Call Number: KA-497 (Softcopy KA-496) MAK KA-157 | Edition: 2013 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   8 9 10 11 12 13 14 15 16 17  Next