Your search for 5574 returns 4375 document(s) |
A Scalable architecture for classifying network security threats, Hal. 3061-3064 |
Author: Jian Tang; Dongxia Wang; Liang Ming and Xiang Li; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Survey of security issues in opportunistic network, Hal. 3092-3096 |
Author: Xu Xiang; | Call Number: Sem-302 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Local area network architectures |
Author: Hutchinson, David M.; | Call Number: 004.68 Hut l | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The local network handbook |
Call Number: R.004.6 Dav | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network protocol handbook/Matthew G.N |
Author: Nagh, Matthew G.; | Call Number: R.004.620 2 Nau n | Type: Buku Referensi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network protocol handbook/ Mattew G. Naugle |
Author: Naugle, Mattew G.; | Call Number: R.004.620 2 Nau n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Microsoft windows security inside out for windows XP and windows 2000 |
Author: Bott, Ed; | Call Number: 005.8 Bot m | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Microsoft windows security inside out for windows XP and windows 2000 |
Author: Bott, Ed; | Call Number: 005.8 Bot m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An AHP Based-Model For Sustainable Manufacturing Performance Evaluation In Automotive Industry (53) |
Author: Elita Amrina
Sha'ri Mohd Yusof; | Call Number: SEM-311 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information security and privacy: third Australian conference, ACISP'98/Brisbane, Australia, July 13-15, 1998 proceedings |
Call Number: 005.8 Inf | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|