Search Result
Save to File
Your search for
47005
returns
5875
document(s)
Managing software security risks, page 99
Author: Gary M. | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
The Trusted PC: skin-deep security, page 103
Author: Andrew B.W. | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
What makes security technologies relevant?, page 38
Author: Li Gong | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Job security vs gaji, page 16
Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Perubahan paradigma dari security menuju survivability, page 28
Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Data security through graphical authentication schemes, HAL. 1013-1024
Author: M.N. Djoja; Naveen Kumar; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Intelligent scheme of data security and message transmission, HAL. 453-455
Author: Prasun Chakrabarti; Shambit Saha, Ranjan Lahiri; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Tutorial: the security of data in networks/ Donald W. Davies
Call Number: 005.8 Dav t | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Network security: data and voice communications/Fred Simonds
Author: Simonds, Fred; | Call Number: 005.8 Sim n | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
A Conceptual Study Of Data Governance For Food Security
Author: Dewi Puspasari; | Call Number: TR-CSUI/018 (015-020)2019 | Type: Technical Report
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
8
9
10
11
12
13
14
15
16
17
Next