Search Result Save to File Save as CSV
Your search for 4572 returns 1214 document(s)
Trust based intrusion detection scheme for secure data transfer, HAL. 651-658
Author: Shabana Mehfuz and M.N. Doja; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Secure authentication system using two-factor authenticatin techniques, HAL. 1048-1054
Author: Supriya Raheja; supriya khaitan and mandeep Kaur; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A fast and secure encryption algorithm for message communication, HAL. 629- 634
Author: Paul A.J.; Varghess Paul, P. Mythili; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Information secure finger print analysis using wavelets, HAL. 638-641
Author: S. Ramapriya, S.K. Srivatsa; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
ITMS - a case study of a secure web application using OWSP guideline, Hal. 494-499
Author: Khairul Anwar Sedek, Mohd Nizam Osman, Nortis bt Osman; | Call Number: SEM-276 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Create a secure web application and generated report as pdf, 165-174
Author: Murdan Sianturi, Mochamad Wahyudi; | Call Number: SEM-348 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Implementasi mekanisme keamanan untuk sistem informasi akademis dengan menggunakan secure provenance
Author: M Rasyid Ridho; | Call Number: KP-1730 (SOFTCOPY KP-1292) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Implementasi mekanisme keamanan pada sistem informasi akademis dengan menggunakan secure provenance
Author: Muhammad Irfan Nasution; | Call Number: KP-1603 (Softcopy KP-1165) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Secure access/ Authentication module (SAM) di PT Reka Piranti Prakarsa
Author: Hendra Marihot; | Call Number: KP-1055 (Softkopi KP-619) SCKP-401 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Secure Interoperability between Cooperating XML Systems by Dynamic Role Translation (866-875)
Author: Somchai Chatvichienchai Mizuho Iwaihara Yahiko Kambayashi; | Call Number: SEM-381 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   18 19 20 21 22 23 24 25 26 27  Next