Search Result
Save to File
Your search for
53359
returns
2783
document(s)
Threat Risk Analysis for Cloud Security based on Attack-Defense Trees (106-111)
Author: Ping Wang Wen-Hui Lin Pu-Tsun Kuo Hui-Tang Lin Tzu Chia Wang; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Analysis and Design of Distributed Simulation System for Network Attack and defense Training (V1-612 -- V1-616)
Author: Yu Song Jiong Liu Haijun Zhou Rong Zhang Wei Chen; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Information security risk analysis/Thomas R.
Author: Poltier, Thomas R.; | Call Number: 005.8 Pel i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer security risk analysis and control a guide for the dp manager
Author: Wong, KK; | Call Number: 658.47 Won r | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
search engines as a security threat, page 25
Author: Julio Cesar | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Development of Incident Response Tool for Cyber Security Training Based on Virtualization and Cloud (115-118)
Author: Y.S. Park C.S. Choi C. Jang D.G. Shin G.C. Cho Hwa Soo Kim; | Call Number: SEM-373 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Performance analysis of virtual machine and container for cloud based high peformance computing platform
Author: Muhammad Irfan Fadhila; | Call Number: SK-1416 (Softcopy SK-898) | Edition: Muhammad H. Hilman | Type: Skripsi
Find Similar
|
Add To Favorites
|
Detail in New Window
Analysis of Cloud-Based Human Resource Information System Adoption Factors Prioritization (295-300)
Author: Mohammad Izzat Raihan Imron Achmad Nizar Hidayanto WIdia Resti Ftriani Widijanto Satyo Nugroho Dedi Iskandar Inan; | Call Number: SEM-371 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Towards risk-oriented security ontology, HAL. 170 - 174
Author: Basuki Rahmad, Suhono H. Supangkat; Jaka Sembiring; Kridanto Surendro; | Call Number: SEM-294 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Electronic commerce : security, risk management; and control
Author: Greenstein, Marilyn; | Call Number: 658.84 Gre e | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev 1
2
3
4
5
6
7
8
9
10
Next