Search Result Save to File Save as CSV
Your search for 43072 returns 719 document(s)
A Flexible Database Security System Using Multiple Access (876-885)
Author: Min-A Jeong Jung-ja Kim Yonggwan Won; | Call Number: SEM-381 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Research on Security Protocol Formalization based on Belief (V1-354 -- V1-356)
Author: Kening Liu Junyao Ye Yinliang Wang; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Vehicular Ad-hoc Networks Security Analysis (V1-387 -- V1-389)
Author: Farzad Sabahi; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
On the Security Program for Making The E-contract under Internet Environment (V1-558 -- V1-560)
Author: Ling Yu Ding Jian; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Research and Design a Security Neighbor Discovery Protocol (V1-667 -- V1-670)
Author: Hua Chun Liu Qing Guang Dai; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Data Protection And Employee Behavior: The Role Of Information Systems Security Culture (516-520)
Author: Lena Connolly Michael Lang; | Call Number: SEM-329 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Implementing Efficient Mangement And Security of Removable Strorage FVM (V2-80--V2-83)
Author: Jun Ma Jiangchun Ren Zhiying Wang Jiangjiang Wu Yong Cheng Songzhu Mei; | Call Number: SEM-328 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Threat Risk Analysis for Cloud Security based on Attack-Defense Trees (106-111)
Author: Ping Wang Wen-Hui Lin Pu-Tsun Kuo Hui-Tang Lin Tzu Chia Wang; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
STUDI KONSEP PENERAPAN COMPUTER SECURITY PENGARUHNYA TERHADAP KENYAMANAN PENGGUNA
Author: Rita Rijayanti, ST; | Call Number: SEM-361 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Analisis implementasi standby database dengan oracle (Studi kasus): backup standby database pada perusahaan jasa komunikasi, HAL. E.7-E.14
Author: Astianto Wibowo, Dhinta Darmantoro, Dana Sulistyo Kusumo; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   18 19 20 21 22 23 24 25 26 27  Next