Search Result Save to File Save as CSV
Your search for 43721 returns 2375 document(s)
Smart card for Room Security System Using Single Board Computer Friendly ARM Mini 2440
Author: Enas Dhuhri Kusuma, Widyawan, Wahyu Prasetya; | Call Number: SEM-367 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
The CISSP perp guide: mastering teh ten domains of computer security/ Ronald L. Krutz
Author: Krutz, Ronald L.; | Call Number: 005.8 Kru c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
An Introduction to computer security: 12th International conference software engineering March 26-30, 1990
Call Number: SEM-148 | Type: Prosiding Seminar
Find Similar |  Add To Favorites |  Detail in New Window 
Computer Security and Ethics Awareness Among IIUM University Students: an Empirical Study (A52-A56)
Author: Mansur Aliyu, Nahel Abdallah, Lasisi Nojeem, Dahir Diyar and Ahmed M. Zeki; | Call Number: SEM-384 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Mapping your fraud risks, page 76
Author: Toby J.F. Bishop and Frank E. Hydoski | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Telecommunication fraud di Indonesia : kajian masalah dan kebijakan penanganannya, Hal. 165-168
Author: Xerandy ST.; | Call Number: SEM-271 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Fraud analysis dan implementasi anomaly detection system
Author: Muhammad Ihcsan Kamil Supri; | Call Number: KP-2342 (Softcopy KP-1904) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Fraud management system PT. Bakrie Telecom Tbk: submodul post-rating dan fraud detection
Author: Nilam Fitriah; | Call Number: KP-0759 (Softkopi KP-325) (SCKP-196) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
On the security propeties and attacks againts mobile agent graph head scaling (MGHS), (LNCS-Lecture Notes in Computer Science 5576) Hal. 223-228
Author: Abid Khan; Qasim Arshad; Xiamu Niu; Zhang Yong; Muhammad Waqas Anwar; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Security evaluation of an infrusion tolerant web service architecture using stochastic activity networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 1-10Hal. 260-269
Author: Zahra Aghajani; Mohammad Abdollahi Azgomi; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next