Search Result
Save to File
Your search for
45204
returns
666
document(s)
Boutique malware-custom made attacks on e-business, 108-112
Author: Jonathan Juin Yang Pan, Chung Che Fung; | Call Number: SEM-349 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Denial-of service attacks rip the internet
Author: Lee Garber | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Cyber attacks protecting national infrastructure
Author: Amoroso, Edward G.; | Call Number: 363.3 Amo c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
API-level attacks on embedded systems, page 67
Author: Mike Bond | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Recovering from Malicious Attacks in Workflow Systems (14-23)
Author: Yajie Zhu Tai Xin Indrakshi Ray; | Call Number: SEM-375 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Survey of Attacks on Mobile AdhocWireless Networks (613-616)
Author: Vikas Solomon Abel; | Call Number: SEM-323 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
The internet made simple/ Peter McBride
Author: McBride, P.K.; | Call Number: 004.67 McB i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Wordstar 6.0 made easy/Ettlin Walter A.
Author: Water A., Ettlin; | Call Number: 005 Wat w | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
From Germany with Information Technology /^cI Made Wiryana
Author: Wiryana, I Made; | Call Number: 658.403 Wir f | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
GPSS: Simulation made simple/ Thomas M. O'Donovan
Author: O'Donovan, Thomas M.; | Call Number: 001.424 Odn g | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev 1
2
3
4
5
6
7
8
9
10
Next