Your search for 43721 returns 2375 document(s) |
Cryptography and Network security principles and practice 4th ed. (INSTRUCTOR'S MANUAL) |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Instructor's Manual
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Solaris: Sunshield basic security module guide solaris 2.5 |
Call Number: 005.43 Sol | Type: Buku Manual
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Efficient Queue and GSI Security Management Framework for Mobile Desktop Grid,Hal. 84-88 |
Author: Muhammad Imran Sarwar, Mohamad Azam Osman; | Call Number: SEM-305 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
CWSP: Certified Wireless Security Profesional official study guide |
Call Number: 005.807 6 Col c | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Proactive versus reactive security investments in the healthcare sector, page 451-471 |
Author: Juhee Kwon and M. Eric Johnson | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Quality competition and market segmentation in the security software market, page 589-606 |
Author: Debabrata Dey, Atanu Lahiri, and Guoying Zhang | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A new patients' rights oriented model of EMR Access security |
Author: YB Dwi setianto; yustina retno wahyu utami; | Call Number: sem-320 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Tecnology and security measures of sharing and applying supple chain information, 492-495 |
Author: Xiaaoli Wang; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Toward a Unified Model of Information Security Policy Compliance, Page 285-311 |
Author: Gregory D. Moody, Mikko Siponen, and Seppo Pahnila | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analisis security wap 1-2 dan implementasi otentikasi pada prototipe aplikasi mobile banking |
Author: Imam Narasamdya; | Call Number: KP-0134 | Type: Kerja Praktek (KP)
|
Find Similar |
Add To Favorites |
Detail in New Window
|