Your search for 46838 returns 4033 document(s) |
Managing software security risks, page 99 |
Author: Gary M. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Trusted PC: skin-deep security, page 103 |
Author: Andrew B.W. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
What makes security technologies relevant?, page 38 |
Author: Li Gong | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Job security vs gaji, page 16 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Perubahan paradigma dari security menuju survivability, page 28 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security of random data perturbation methods, page 487 |
Author: Muralidhar | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Measurement and tuning of computer systems |
Author: Ferrari, Domenico; | Call Number: 004.61 Fer m | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
System performance tuning |
Author: Loukides, Mike; | Call Number: 005.43 Lou s | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Design and Evaluation of Auto-ID Enabled Shopping Assistance Artifacts in Customers’ Mobile Phones: Two Retail Store Laboratory Experiments, Page 83-113 |
Author: Viswanath Venkatesh, John A. Aloysius, Hartmut Hoehle, and Scot Burton | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Eye mouse based HCI for people with disablities, Hal. VI.8-VI.12 |
Author: Supeno Mardi S.N. Mochamad Hariadi; Eko Handoko; Achmad Affandi; | Call Number: SEM-280 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|