Search Result Save to File Save as CSV
Your search for 35815 returns 1830 document(s)
Internet security made easy: a plain english guide to protecting yourself and your company online/Douglas Schwitzer
Author: Schweitzer, Douglas; | Call Number: 005.8 Sch i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
E-Commerce security strategies: protecting the enterprise
Author: Cameron, Debra; | Call Number: 658.478 Cam e | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Gigabit networks: standards and schemes for next-generation networking/Paul Izzo
Author: Izzo, Paul; | Call Number: 004.62 Izz g | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Performance evaluation of DSR in multi-services ad hoc networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 432-437
Author: Ronald Beaubrun; Badji Molo; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Sensor disposition problem in wirelsess ad-hoc sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 485-493
Author: Takahide Yanaka; Toshihiko Susana; Hiroshi Masuyama; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Mobility Entropy-Based Clusterhead Selection Algorithm for Ad Hoc Networks (V1-64 -- V1-68)
Author: Baolin Sun Chao Gui Yufu Jia Ying Song; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Congestion Control Framework for Disseminating Event-Driven Safety Messages in Vehicular Ad-Hoc Networks (VANETs) (71-75)
Author: Kamarulnizam Abu Bakar Mohamad Yusof Darus; | Call Number: SEM-297 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Firewalls and internet security: repellinghthewily hacker
Author: Cheswick, William R.; | Call Number: 005.8 Che f | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Adaptive cluster based routing protocol with ant colony optimization for mobile ad-hoc network in disaster area
Author: E. Budianto, A. Hafidh, MS Alvissalim, and A. Wibowo | Call Number: JURNAL ILMU KOMPUTER DAN INFORMASI, Vol. 5 No. 2 June 2012 | Type: UI-ana Indek Artikel
Find Similar |  Add To Favorites |  Detail in New Window 
Self-initialized distributed certificated authority for mobile ad hoc network, (LNCS-Lecture Notes in Computer Science 5576) Hal. 392-401
Author: Meng Ge; Kwok Yan Lam; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next