Search Result Save to File Save as CSV
Your search for 36116 returns 1891 document(s)
Penerapan algoritma gabungan RC4 dan BASE64 pada sistem keamanan E-COMMRECE ( hal. A-47 - A-52 )
Author: Febrian Wahyu.C , Adriana.P Rahangiar , Febry de Fretes; | Call Number: SEM-365 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Perencanaan Kebijakan Keamanan Informasi Berdasarkan Information Security Management System [ISMS] ISO 27001 studi kasus Bank XYZ
Author: Aries Fajar Kurnia; | Call Number: PA-0087 (Softcopy PA-0087) | Edition: 2006 | Type: Proyek Akhir (PA)
Find Similar |  Add To Favorites |  Detail in New Window 
Data Security using Block Cipher data Encryption Standard (DES) And Stream Cipher Ron Code 4 (RC4) (A-68 -- A-73)
Author: Victor Amrizal Herlino Nanang Chandra Wirawan; | Call Number: SEM-316 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Cryptanalytic view of the NSA's skipjack block cipher design, (LNCS-Lecture Notes in Computer Science 5576) Hal. 368-381
Author: Jongsung Kim; Raphael C.W. Phan; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Implementasi rc4 stream cipher untuk keamanan basis data ( Hal 64 - 67 )
Author: Wahyu Hari Haji, Slamet Mulyono; | Call Number: SEM - 365 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Jaringan komputer dengan sistem keamanan internet malalui telekomunikasi wireless LAN, HAL. 22 - 34
Author: Indri Neforawati, Hoga Saragih; | Call Number: SEM-293 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Mengenal, mencegah, menanggulangi, virus komputer/Sandi Setiawan
Author: Setiawan, Sandi; | Call Number: 005.8 Set m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
J2EE 1.4 essentials/Aaron E. Walsh
Author: Walsh, Aaron E.; | Call Number: 005.12 Wal j | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The principles and evaluation of FEC, Hal. 3692-3694
Author: Zhengjun LI; Yixuan FAN; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A fast and secure encryption algorithm for message communication, HAL. 629- 634
Author: Paul A.J.; Varghess Paul, P. Mythili; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next