Your search for 45250 returns 545 document(s) |
A method of detecting stack overflow vulnerability of binary code of a component, 212-216 |
Author: Hang Zhengbo, Yang Hebiao, Da Wei; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Texture-based method for modeling the background and detecting moving objects, page 657 |
Author: M. Heikkila | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Perlindungan hak cipta data informasi geospasial dengan menggunakan binary code |
Author: Nachnoer Nuklir Radariawan Arss; | Call Number: T-993 (Softcopy T-702) Source code T-146 | Edition: 2012 | Type: Tesis
|
Find Similar |
Add To Favorites |
Detail in New Window
|
g-binary: A New Non-parameterized Code for Improved Interved File Compression (464-473) |
Author: Ilias Nitsos
Georgios Evangelidis
Dimitrios Dervos; | Call Number: SEM-381 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Steal this code: create reusable software component for windows 95 and windows NT |
Author: Williams, Al; | Call Number: 005.265 Wil s | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Steal this code: create reusable software component for windows 95 and windows NT |
Author: Williams, Al; | Call Number: 005.265 Wil s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Integrating the QMR method with first principles material science application code, Hal. 213-218 |
Author: N.M. Nachtigal; W.A. Shilton; G.M. Stocks; D.M.C. Nicholson; Y. Wang; | Call Number: SEM-229 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On the covering radius of second order binary reed-muller code in set of resilliet boolean functions, (LNCS-Lecture Notes in Computer Science 2898), Hal. 82-92 |
Author: Yuri Borissov; An Braeken; Svetla Nikova; and Preneel; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Web Vulnerability Assessment: Outsoure Dilemmas |
Author: Arniyati Ahmad , Siti Rohaidah Ahmad , Nor Fatimah Awang , Zulkarnian Md. Ali; | Call Number: SEM-368 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Solaris binary compatibility guide |
Call Number: 005.43 Sol | Type: Buku Manual
|
Find Similar |
Add To Favorites |
Detail in New Window
|