Your search for 47801 returns 578 document(s) |
Will we consider ourselves better off, page 47 |
Author: Stephen J.L. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Fourier series and boudary value problems/ W.E. Williams |
Author: Williams, W.E.; | Call Number: 515.243 3 Wil f | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Evaluasi Metode Deteksi Halaman We Phishing |
Author: Faris Humam; | Call Number: T-1268 (Softcopy T-976) Source code T-329 Mak T-72 | Edition: 2020 | Type: Tesis
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Model Driven Security: From UML Models to Access Control Infrastructures, page 39-91 |
Author: D. Basin, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Fine-grain access control using shibboleth for the storage resource broker,(LNCS-Lecture Notes in Computer Science 5576) Hal. 41-50 |
Author: Vineela Muppavarapu; Soon M. Chung; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Grouping provenance information to improve efficiency of access control, (LNCS-Lecture Notes in Computer Science 5576) Hal. 51-59 |
Author: Amril Syalim; Yoshiaki; Konichi Sakurai; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Selective regression test for access control systems employing RBCA,(LNCS-Lecture Notes in Computer Science 5576) Hal. 70-79 |
Author: Chao Huang; Jianling Sun; Xinyu Wang; Yuanjie Si; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Formal verification for access control in web information sharing system, (LNCS-Lecture Notes in Computer Science 5576) Hal. 80-89 |
Author: Akihiro Sakai; Yoshiaki Hori; Kouichi Sakurai; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Development of university of indonesia next generation fire wall prototype and access control with deep packet inspection |
Author: Harish Muhammad Nazief; Tonny Adhi Sabastian; alfan presekal; Gladhi Guarddin; | Call Number: sem-320 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An Empirical Study of the Characteristics of Access Control Model Towards Secure KMS in Collaborative Environment (hal 1378-1383) |
Author: Azreena Abu Bakar, Rusli Abdullah, Nur Izura Udzir, Hamidah Ibrahim; | Call Number: SEM-368 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|