Search Result Save to File Save as CSV
Your search for 53359 returns 2783 document(s)
Threat Risk Analysis for Cloud Security based on Attack-Defense Trees (106-111)
Author: Ping Wang Wen-Hui Lin Pu-Tsun Kuo Hui-Tang Lin Tzu Chia Wang; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Analysis and Design of Distributed Simulation System for Network Attack and defense Training (V1-612 -- V1-616)
Author: Yu Song Jiong Liu Haijun Zhou Rong Zhang Wei Chen; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Information security risk analysis/Thomas R.
Author: Poltier, Thomas R.; | Call Number: 005.8 Pel i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security risk analysis and control a guide for the dp manager
Author: Wong, KK; | Call Number: 658.47 Won r | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
search engines as a security threat, page 25
Author: Julio Cesar | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Development of Incident Response Tool for Cyber Security Training Based on Virtualization and Cloud (115-118)
Author: Y.S. Park C.S. Choi C. Jang D.G. Shin G.C. Cho Hwa Soo Kim; | Call Number: SEM-373 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Performance analysis of virtual machine and container for cloud based high peformance computing platform
Author: Muhammad Irfan Fadhila; | Call Number: SK-1416 (Softcopy SK-898) | Edition: Muhammad H. Hilman | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Analysis of Cloud-Based Human Resource Information System Adoption Factors Prioritization (295-300)
Author: Mohammad Izzat Raihan Imron Achmad Nizar Hidayanto WIdia Resti Ftriani Widijanto Satyo Nugroho Dedi Iskandar Inan; | Call Number: SEM-371 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Towards risk-oriented security ontology, HAL. 170 - 174
Author: Basuki Rahmad, Suhono H. Supangkat; Jaka Sembiring; Kridanto Surendro; | Call Number: SEM-294 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Electronic commerce : security, risk management; and control
Author: Greenstein, Marilyn; | Call Number: 658.84 Gre e | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next