Search Result
Save to File
Your search for
8948
returns
1556
document(s)
Towards risk-oriented security ontology, HAL. 170 - 174
Author: Basuki Rahmad, Suhono H. Supangkat; Jaka Sembiring; Kridanto Surendro; | Call Number: SEM-294 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Data security through graphical authentication schemes, HAL. 1013-1024
Author: M.N. Djoja; Naveen Kumar; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Survey of vulnerability and security of mobile ad hoc networks
Author: Siddharth S Rautaray and Sanjeev Sharma; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Built-in security feature of sensor network, HAL. 440 - 447
Author: Kalpana Sharma; Vikash Varum; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Intelligent scheme of data security and message transmission, HAL. 453-455
Author: Prasun Chakrabarti; Shambit Saha, Ranjan Lahiri; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Information security management: implementation and global standard (ISO-2700)
Author: Jivika Govil; Jivesh Govil; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Enforcing security in .net based web services, HAL. 996-1001
Author: E. George Dharma Prakash Raj; N. Ssikuladevi; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Solaris SunShield basic security modula guide
Call Number: 005.43 Sol | Type: Buku Manual
Find Similar
|
Add To Favorites
|
Detail in New Window
A Scalable architecture for classifying network security threats, Hal. 3061-3064
Author: Jian Tang; Dongxia Wang; Liang Ming and Xiang Li; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
A Survey of security issues in opportunistic network, Hal. 3092-3096
Author: Xu Xiang; | Call Number: Sem-302 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
16
17
18
19
20
21
22
23
24
25
Next