Your search for 43788 returns 1130 document(s) |
Defense Science |
Call Number: [7 (1988): 1-10, 1989: 1-3, 1989: 7-12] | Type: Jurnal/ Majalah
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Trust on web browser: attack vs. defense, (LNCS-Lecture Notes in Computer Science 2576) Hal 241-253 |
Author: Tie-Yan Li; Yongdong Wu; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Defense Electronics |
Call Number: [14 (1982): 5-9, 16 (1984): 1-6, 6 (1984): 7-9, 16 (1984): 10-12, 17 (1985): 1-6] | Type: Jurnal/ Majalah
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Defense Management Journal |
Call Number: [12 (1976): 1-4, 13 (1977): 1-4, 14 (1978):1-3,5,6, 15 (1979): 1-5, 16 (1980): 1-4, 18 (1982): 1-4, 19 (1983): 1-4, 20 (1984): 1-4, 21 (1985): 1-4] | Type: Jurnal/ Majalah
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Utilization Of A#S Information=Inferencing Fusion Method For Nation Defense |
Author: Arwin Datumaya Wahyudi Sumari, Adang Suwandi Ahmad, Aciek Ida Wuryandari. Jaka Sembiring; | Call Number: SEM-341 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
THE UTILIZATION OF A3S INFORMATION-INFERENCING FUSION METHOD FOR NATION DEFENSE |
Author: Arwin Datumaya Wahyudi Sumari, Adang Suwandi Ahmad, Aciek Ida Wuryandari, Jaka Sembiring; | Call Number: SEM-341 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Business Intelligence Development for National Defense Equipment Supplier Company |
Author: Johanes Iman Anugrah; | Call Number: KP-2734 | Type: Kerja Praktek (KP)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Threat Risk Analysis for Cloud Security based on Attack-Defense Trees (106-111) |
Author: Ping Wang
Wen-Hui Lin Pu-Tsun Kuo
Hui-Tang Lin
Tzu Chia Wang; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Science |
Call Number: 4 (1983): 2-3 | Type: Jurnal/ Majalah
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analysis and Design of Distributed Simulation System for Network Attack and defense Training (V1-612 -- V1-616) |
Author: Yu Song
Jiong Liu
Haijun Zhou
Rong Zhang
Wei Chen; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|