Search Result
Save to File
Your search for
40159
returns
1664
document(s)
WAPI Secure Access Authentication Scheme for Heterogeneous Network Based on Identity-Based Cryptograph (130-135)
Author: FENG Tao JIAO Jian; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
The challenge of building survivable information intensive systems, page 39
Author: Anita Jones | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Mobile Application for Real-Time Bird Sound Recognition using Convolutional Neural Network
Author: Rodiatul Adawiyah; | Call Number: KA-1342 (Softcopi KA-1335) MAK KA-986 | Edition: 2020 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Protection and security on the information superhighway
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Cipher systems: the protection of communciations
Author: Beker, Henry; | Call Number: 005.82 Bek c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Building a global information assurance program/ Raymond J. Curts
Author: Curts, Raymond J.; | Call Number: 005.8 Cur b | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Security metrics: a beginner's guide
Author: Wong, Caroline S.; | Call Number: 005.8 Won s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Information assurance for the enterprise: a roadmap to information security/ Corey Schou
Author: Schou, Corey; | Call Number: 005.8 Sch c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Next generation environmental models and computational methods
Call Number: 658.408 Nex | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Data network design strategies/edited by Ray Sarch
Call Number: 004 Dat | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
9
10
11
12
13
14
15
16
17
18
Next