Search Result Save to File Save as CSV
Your search for 47005 returns 5875 document(s)
Managing software security risks, page 99
Author: Gary M. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
The Trusted PC: skin-deep security, page 103
Author: Andrew B.W. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
What makes security technologies relevant?, page 38
Author: Li Gong | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Job security vs gaji, page 16
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Perubahan paradigma dari security menuju survivability, page 28
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Data security through graphical authentication schemes, HAL. 1013-1024
Author: M.N. Djoja; Naveen Kumar; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Intelligent scheme of data security and message transmission, HAL. 453-455
Author: Prasun Chakrabarti; Shambit Saha, Ranjan Lahiri; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Tutorial: the security of data in networks/ Donald W. Davies
Call Number: 005.8 Dav t | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Network security: data and voice communications/Fred Simonds
Author: Simonds, Fred; | Call Number: 005.8 Sim n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
A Conceptual Study Of Data Governance For Food Security
Author: Dewi Puspasari; | Call Number: TR-CSUI/018 (015-020)2019 | Type: Technical Report
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   8 9 10 11 12 13 14 15 16 17  Next