Search Result Save to File Save as CSV
Your search for 46031 returns 1114 document(s)
Web Vulnerability Assessment: Outsoure Dilemmas
Author: Arniyati Ahmad , Siti Rohaidah Ahmad , Nor Fatimah Awang , Zulkarnian Md. Ali; | Call Number: SEM-368 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Windows of vulnerability: a case study analysis, page 52
Author: William A.A. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Survey of vulnerability and security of mobile ad hoc networks
Author: Siddharth S Rautaray and Sanjeev Sharma; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A method of detecting stack overflow vulnerability of binary code of a component, 212-216
Author: Hang Zhengbo, Yang Hebiao, Da Wei; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan vulnerability assessment report generator pada PT IBM Indonesia
Author: Clara Vania; | Call Number: KP-0920 (Softkopi KP-485) SCKP-321 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
How Much to Share with Third Parties? User Privacy Concerns and Website Dilemmas, Page 143-164
Author: Ram D. Gopal, Hooman Hidaji, Raymond A. Patterson, Erik Rolland, and Dmitry Zhdanov | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Teaching in the post coved-19 era: world education dilemmas teaching innovations and solutions in the age of crisis/ Ismail Fayed editors
Call Number: 372.2 Tea | Type: E-book
Find Similar |  Add To Favorites |  Detail in New Window 
Teaching in the post coved-19 era: world education dilemmas teaching innovations and solutions in the age of crisis/ Ismail Fayed editors
Call Number: 372.2 Tea | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Analisa Implementasi Vulnerability Management Program Dengan Menggunakan Kerangka Kerja Cobit dan Vulnerability Management Model : Studi Kasus Di PT Indosat Tbk
Author: Bagus Irawan Handoyo; | Call Number: KA-247 (Softcopy KA-246) | Edition: 2012 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Common vulnerability markup language, (LNCS-Lecture Notes in Computer Science 2576) Hal 228-240
Author: Haitao Tian; Liusheng Huang; Zhi Zhou; Hui Zhang; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next