Your search for 38620 returns 3936 document(s) |
Job security vs gaji, page 16 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Perubahan paradigma dari security menuju survivability, page 28 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security of random data perturbation methods, page 487 |
Author: Muralidhar | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
ATM control, audit and security/ Chester M. WInters |
Author: Winters, Chester M.; | Call Number: 005.8 Win a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
International journal of computer science and network security |
Call Number: 9 (2009): 6 June | Type: Jurnal/ Majalah
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Managing information security: a program for the electronic information age |
Author: Schweitzer, James A.; | Call Number: 658.478 Sch m | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Unix system security a guide for users and systems administrators |
Author: Curry, David A.; | Call Number: 005.43 Cur u | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Towards risk-oriented security ontology, HAL. 170 - 174 |
Author: Basuki Rahmad, Suhono H. Supangkat; Jaka Sembiring; Kridanto Surendro; | Call Number: SEM-294 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Data security through graphical authentication schemes, HAL. 1013-1024 |
Author: M.N. Djoja; Naveen Kumar; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Survey of vulnerability and security of mobile ad hoc networks |
Author: Siddharth S Rautaray and Sanjeev Sharma; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|