Your search for 43721 returns 2375 document(s) |
Smart card for Room Security System Using Single Board Computer Friendly ARM Mini 2440 |
Author: Enas Dhuhri Kusuma, Widyawan, Wahyu Prasetya; | Call Number: SEM-367 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The CISSP perp guide: mastering teh ten domains of computer security/ Ronald L. Krutz |
Author: Krutz, Ronald L.; | Call Number: 005.8 Kru c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An Introduction to computer security: 12th International conference software engineering March 26-30, 1990 |
Call Number: SEM-148 | Type: Prosiding Seminar
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer Security and Ethics Awareness Among IIUM University Students: an Empirical Study (A52-A56) |
Author: Mansur Aliyu, Nahel Abdallah, Lasisi Nojeem, Dahir Diyar and Ahmed M. Zeki; | Call Number: SEM-384 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Mapping your fraud risks, page 76 |
Author: Toby J.F. Bishop and Frank E. Hydoski | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Telecommunication fraud di Indonesia : kajian masalah dan kebijakan penanganannya, Hal. 165-168 |
Author: Xerandy ST.; | Call Number: SEM-271 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Fraud analysis dan implementasi anomaly detection system |
Author: Muhammad Ihcsan Kamil Supri; | Call Number: KP-2342 (Softcopy KP-1904) | Type: Kerja Praktek (KP)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Fraud management system PT. Bakrie Telecom Tbk: submodul post-rating dan fraud detection |
Author: Nilam Fitriah; | Call Number: KP-0759 (Softkopi KP-325) (SCKP-196) | Type: Kerja Praktek (KP)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On the security propeties and attacks againts mobile agent graph head scaling (MGHS), (LNCS-Lecture Notes in Computer Science 5576) Hal. 223-228 |
Author: Abid Khan; Qasim Arshad; Xiamu Niu; Zhang Yong; Muhammad Waqas Anwar; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security evaluation of an infrusion tolerant web service architecture using stochastic activity networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 1-10Hal. 260-269 |
Author: Zahra Aghajani; Mohammad Abdollahi Azgomi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|