Search Result Save to File Save as CSV
Your search for 38620 returns 3936 document(s)
Job security vs gaji, page 16
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Perubahan paradigma dari security menuju survivability, page 28
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Security of random data perturbation methods, page 487
Author: Muralidhar | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
ATM control, audit and security/ Chester M. WInters
Author: Winters, Chester M.; | Call Number: 005.8 Win a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
International journal of computer science and network security
Call Number: 9 (2009): 6 June | Type: Jurnal/ Majalah
Find Similar |  Add To Favorites |  Detail in New Window 
Managing information security: a program for the electronic information age
Author: Schweitzer, James A.; | Call Number: 658.478 Sch m | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Unix system security a guide for users and systems administrators
Author: Curry, David A.; | Call Number: 005.43 Cur u | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Towards risk-oriented security ontology, HAL. 170 - 174
Author: Basuki Rahmad, Suhono H. Supangkat; Jaka Sembiring; Kridanto Surendro; | Call Number: SEM-294 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Data security through graphical authentication schemes, HAL. 1013-1024
Author: M.N. Djoja; Naveen Kumar; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Survey of vulnerability and security of mobile ad hoc networks
Author: Siddharth S Rautaray and Sanjeev Sharma; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   19 20 21 22 23 24 25 26 27 28  Next