Search Result Save to File Save as CSV
Your search for 38223 returns 2664 document(s)
Computer security : art and science
Author: Bishop, Matt; | Call Number: 005.8 Bis c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer networking with internet protocols and technology
Author: Stallings William; | Call Number: 004.68 Sta c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer networks: protocols, standards, and interfaces
Author: Black, Uyless D.; | Call Number: 004.6 Bla c | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Computer networks and their protocols/ D.W. Davies
Author: Davies, D.W.; | Call Number: 004.6 Dav c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Kajian tentang Aspek security dan Authentication Sistem Informasi On Line Studi Kasus : Rancangan Sistem Informasi Akademi PEFEUI
Author: Heri Yulianto; | Call Number: T-0186 (Softcopy T-0622) | Edition: 2000 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Security Challenges in Wireless Mesh Network Deployment and User Authentication (EAP) Method (V1-333 -- V1-337)
Author: Min Lin Shaoyong Chen; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Improvement and Security analysis on Symmetric key authentication Protocol Needham-Schoeder (V1-357 -- V1-360)
Author: Junyao Ye Kening Liu Yinglian Wang; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security
Author: editors Virginia, Alexandria; | Call Number: 005.8 Com | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security
Author: Golddmann, Dieter; | Call Number: 005.8 Gol c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Multy-party Computation from any linear secret sharing scheme unconditionally secure againts adaptive adversary: the zero-error case, (LNCS-Lecture Notes in Computer Science 2576) Hal 1-15
Author: Ventzislav Nikov; Svetla Nikova; Bart Preneel; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   4 5 6 7 8 9 10 11 12 13  Next