Search Result Save to File Save as CSV
Your search for 47801 returns 578 document(s)
Will we consider ourselves better off, page 47
Author: Stephen J.L. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Fourier series and boudary value problems/ W.E. Williams
Author: Williams, W.E.; | Call Number: 515.243 3 Wil f | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Evaluasi Metode Deteksi Halaman We Phishing
Author: Faris Humam; | Call Number: T-1268 (Softcopy T-976) Source code T-329 Mak T-72 | Edition: 2020 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Model Driven Security: From UML Models to Access Control Infrastructures, page 39-91
Author: D. Basin, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Fine-grain access control using shibboleth for the storage resource broker,(LNCS-Lecture Notes in Computer Science 5576) Hal. 41-50
Author: Vineela Muppavarapu; Soon M. Chung; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Grouping provenance information to improve efficiency of access control, (LNCS-Lecture Notes in Computer Science 5576) Hal. 51-59
Author: Amril Syalim; Yoshiaki; Konichi Sakurai; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Selective regression test for access control systems employing RBCA,(LNCS-Lecture Notes in Computer Science 5576) Hal. 70-79
Author: Chao Huang; Jianling Sun; Xinyu Wang; Yuanjie Si; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Formal verification for access control in web information sharing system, (LNCS-Lecture Notes in Computer Science 5576) Hal. 80-89
Author: Akihiro Sakai; Yoshiaki Hori; Kouichi Sakurai; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Development of university of indonesia next generation fire wall prototype and access control with deep packet inspection
Author: Harish Muhammad Nazief; Tonny Adhi Sabastian; alfan presekal; Gladhi Guarddin; | Call Number: sem-320 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
An Empirical Study of the Characteristics of Access Control Model Towards Secure KMS in Collaborative Environment (hal 1378-1383)
Author: Azreena Abu Bakar, Rusli Abdullah, Nur Izura Udzir, Hamidah Ibrahim; | Call Number: SEM-368 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next