Your search for 35754 returns 4329 document(s) |
Advances in information security and assurance: third international conference and workshops, ISA 2009 Seoul, Korea, June 2009 Proceedings |
Call Number: 005.8 Adv | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Sistem informasi credit scoring berbasis database untuk retail banking, Hal. 184-184 |
Author: Emanuel Kristijadi; | Call Number: SEM-276 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Iformation systems security |
Author: Fisher, Royal P.; | Call Number: 658.478 Fis | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information security management : Concepts and Practice |
Author: Raggad, Bel G.; | Call Number: 005.8 Rag i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Data mining techniques for processing artificial neural network based systems, HAL. 8 - 22 |
Author: K.S. Madhavan; T.S.R. Murthy; | Call Number: SEM-291 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer/ D.W. Davies |
Author: Davies, Donald Watts; | Call Number: 384 Dav s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Smart card for Room Security System Using Single Board Computer Friendly ARM Mini 2440 |
Author: Enas Dhuhri Kusuma, Widyawan, Wahyu Prasetya; | Call Number: SEM-367 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Practical guide to security assessments/ Sudhanshu Kairab |
Author: Kairab, Sudhanshu; | Call Number: 658.478 Kai p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Data security through graphical authentication schemes, HAL. 1013-1024 |
Author: M.N. Djoja; Naveen Kumar; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Inside network perimeter security: the definitve guide to firewalls, VPNs, routers, and instruction Detection |
Author: Northcutt, Stephen...[et. al.]; | Call Number: 005.8 Ins | Edition: 2003 | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|