Your search for 46031 returns 1114 document(s) |
Web Vulnerability Assessment: Outsoure Dilemmas |
Author: Arniyati Ahmad , Siti Rohaidah Ahmad , Nor Fatimah Awang , Zulkarnian Md. Ali; | Call Number: SEM-368 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Windows of vulnerability: a case study analysis, page 52 |
Author: William A.A. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Survey of vulnerability and security of mobile ad hoc networks |
Author: Siddharth S Rautaray and Sanjeev Sharma; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A method of detecting stack overflow vulnerability of binary code of a component, 212-216 |
Author: Hang Zhengbo, Yang Hebiao, Da Wei; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Pengembangan vulnerability assessment report generator pada PT IBM Indonesia |
Author: Clara Vania; | Call Number: KP-0920 (Softkopi KP-485) SCKP-321 | Type: Kerja Praktek (KP)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
How Much to Share with Third Parties? User Privacy Concerns and Website Dilemmas, Page 143-164 |
Author: Ram D. Gopal, Hooman Hidaji, Raymond A. Patterson, Erik Rolland, and Dmitry Zhdanov | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Teaching in the post coved-19 era: world education dilemmas teaching innovations and solutions in the age of crisis/ Ismail Fayed editors |
Call Number: 372.2 Tea | Type: E-book
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Teaching in the post coved-19 era: world education dilemmas teaching innovations and solutions in the age of crisis/ Ismail Fayed editors |
Call Number: 372.2 Tea | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analisa Implementasi Vulnerability Management Program Dengan Menggunakan Kerangka Kerja Cobit dan Vulnerability Management Model : Studi Kasus Di PT Indosat Tbk |
Author: Bagus Irawan Handoyo; | Call Number: KA-247 (Softcopy KA-246) | Edition: 2012 | Type: Karya Akhir (KA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Common vulnerability markup language, (LNCS-Lecture Notes in Computer Science 2576) Hal 228-240 |
Author: Haitao Tian; Liusheng Huang; Zhi Zhou; Hui Zhang; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|