Search Result Save to File Save as CSV
Your search for 43072 returns 719 document(s)
Audit, Analisa dan Perancangan Infrastruktur Network Security studi kasus: Mobil Internet Services Company
Author: Eko Kurniawan; | Call Number: T-0357 (Softcopy T-007) | Edition: 2003 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Perencanaan Kebijakan Keamanan Informasi Berdasarkan Information Security Management System [ISMS] ISO 27001 studi kasus Bank XYZ
Author: Aries Fajar Kurnia; | Call Number: PA-0087 (Softcopy PA-0087) | Edition: 2006 | Type: Proyek Akhir (PA)
Find Similar |  Add To Favorites |  Detail in New Window 
Streaming media initiative may be stymied* is the internet an energy hog* two groups to focus on nertwork security, page 19
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Network address translators: effects on security protocols and applications in the TCP/IP stack, page 42
Author: Shiuh-Pyang | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography: a new dimension in computer data security: a guide for the design and implementation of secure systems
Author: Meyer, Carl H.; | Call Number: 652.8 Mey c | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Studi model organisasi CSITs (Computer Security Incident Response TEAMS) pada perusahaan berskala besar, HAL. C.61-C.65
Author: Riza Kurniawan, Budi Rahardjo; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Design and delivery of undergraduate IT security management course, (LNCS-Lecture Notes in Computer Science 5576) Hal. 402-411
Author: Jemal H. Abawaijy; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Protecting global SOA and other security threats, (LNCS-Lecture Notes in Computer Science 5576) Hal 652-661
Author: Deven Shah; Ashish Mangal; Mayank Argawal; Mahendra Mehra; Tushar Dave; Dhiren Patel; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A mathematical approach towards trust based security in pervasive computing environment, (LNCS-Lecture Notes in Computer Science 5576) Hal 702-711
Author: Naima Iltaf; Mukhtar Hussain; Farrukh Kamran; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Device authentication/ authorization protocol for home network in next generation security, (LNCS-Lecture Notes in Computer Science 5576) Hal 760-768
Author: Jong Sik Moon; Deok Gyu Lee; Im-Yeong Lee; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   20 21 22 23 24 25 26 27 28 29  Next