Search Result Save to File Save as CSV
Your search for 53018 returns 4349 document(s)
PS-LTL for constraint-based security protocol analysis, (LNCS-Lecture Notes in Computer Science 3668) Hal 439-440
Author: Ricardo Corin; Ari Saptawijaya; Sandro Etalle; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Neural Network Based Transient Stability Model to Analyze The Security of Java-Bali 500 kV Power System (hal 1301-1306)
Author: Irrine Budi Sulistiawati, Muhammad Abdillah, Adi Soeprijanto; | Call Number: SEM-368 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Implementation Of Motion Dertection On Early Warning System For Residential Security Based Multimedia Messaging Service (MMS) (E48-E53)
Author: Lia Rainingsih Arini Viva Arifin; | Call Number: SEM-384 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Development of Incident Response Tool for Cyber Security Training Based on Virtualization and Cloud (115-118)
Author: Y.S. Park C.S. Choi C. Jang D.G. Shin G.C. Cho Hwa Soo Kim; | Call Number: SEM-373 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Index-based persistent document identifiers[P.5-24]
Author: Spinellis, Diomidis | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan tata kelola keamanan informasi berdasarkan information security management system (ISMS) ISO/IEC 27001:2005 untuk pengelolaan data migas yang di kelola oleh pihak ketiga: studi kasus pusat data dan teknologi informasi energi dan sumber daya mineral
Author: Dian Ikasari; | Call Number: KA-682 (Softcopy KA-680) MAK KA-341 | Edition: 2015 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Information systems strategy and implementation: a case study of a bulding society, page 150
Author: Walsham | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Applying information-retrieval methods to software reuse: a case study, page 67
Author: Eric J. S. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Obstacles of development and usage of information technology in public organizations (case study)
Author: Yaghoubi Nourmohammad; Arab Mohammad Ali; Pourshahabi | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Feasibility study: rich internet application pada ACC enterprise global information system
Author: Hadyan Andika; | Call Number: KP-0656 (SofkopiKP-220) (SCKP-107) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   10 11 12 13 14 15 16 17 18 19  Next