Showing 1 - 20 results of 183,573 for search '"security"', query time: 1.26s Refine Results
  1. 1
  2. 2
    by Lazar Stošić, Dragan Veličković
    Published 2013-01-01
    Subjects: ...computer security...
    Get full text
    Article
  3. 3
    ... are also facing the major problem of the security, so that why lots of people are doing research on WLAN...
    Get full text
    Others
  4. 4
    by Er-Win Tan
    Published 2013-12-01
    Subjects: ...security dilemma...
    Get full text
    Article
  5. 5
    by Kun-Ta Lee, 李坤達
    Published 2012
    ...碩士 === 淡江大學 === 資訊管理學系碩士在職專班 === 100 === A reliable investing environment is a must for Security...
    Get full text
    Others
  6. 6
  7. 7
  8. 8
    by Hanna SOMMER, Grzegorz ZAKRZEWSKI
    Published 2020-12-01
    Subjects: ...ecological security...
    Get full text
    Article
  9. 9
    by Alberto Giaretta, Nicola Dragoni, Fabio Massacci
    Published 2019-09-01
    Subjects: ...security-by-contract...
    Get full text
    Article
  10. 10
    by Luis Tomé
    Published 2010-01-01
    Subjects: ...Security...
    Get full text
    Article
  11. 11
    Subjects: ...food security|protein security|nutrition|dietary pattern...
    Get full text
    Article
  12. 12
    by Muhammad Siddique Ansari
    Published 2016-03-01
    ... and to deal with the IT framework's Security inside association. Each time the new innovation is made...
    Get full text
    Article
  13. 13
    by Anton MANDA
    Published 2016-06-01
    Subjects: ...security...
    Get full text
    Article
  14. 14
    by Liana E. Pozza, Damien J. Field
    Published 2020-12-01
    Subjects: ...Soil security...
    Get full text
    Article
  15. 15
    by Yen-Hsuan Chang, 張晏瑄
    Published 2009
    ... of S corresponding to A (in G) if |D(u)| ≥ |A(u)| for all u ∈ S. A nonempty set S ⊆ V (G) is called a secure set of G...
    Get full text
    Others
  16. 16
  17. 17
  18. 18
    by Yan-Jin Yang, 楊衍瑾
    Published 2017
    ... to ensure national security interests, and by confidentiality laws and regulations, security education, etc...
    Get full text
    Others
  19. 19
  20. 20