Search Result Save to File Save as CSV
Your search for 47005 returns 5912 document(s)
Security: technical, social, and legal challeges, page 109
Author: Bill A. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Open source security: oportunity or oxymoron, page 18
Author: Goerge Lawton | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Managing software security risks, page 99
Author: Gary M. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
The Trusted PC: skin-deep security, page 103
Author: Andrew B.W. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
What makes security technologies relevant?, page 38
Author: Li Gong | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Job security vs gaji, page 16
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Perubahan paradigma dari security menuju survivability, page 28
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Data security through graphical authentication schemes, HAL. 1013-1024
Author: M.N. Djoja; Naveen Kumar; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Intelligent scheme of data security and message transmission, HAL. 453-455
Author: Prasun Chakrabarti; Shambit Saha, Ranjan Lahiri; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Tutorial: the security of data in networks/ Donald W. Davies
Call Number: 005.8 Dav t | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   7 8 9 10 11 12 13 14 15 16  Next