Search Result
Save to File
Your search for
10387
returns
1347
document(s)
Internet Besieged: Countering Cyberspace Scofflans/Dorothy Denning and Peter J. Denning
Author: Denning Dorothy E.; | Call Number: 364.168 Int | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer network security: theory and practice/ Jie Wang
Author: Wang Jie; | Call Number: 005.8 Wan c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Enterprise security architecture: a business-driven approach
Author: Sherwood, John; | Call Number: 005.8 She e | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Smart card security and applications/Mike Hendry
Author: Hendry, Mike; | Call Number: 006 Hen s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Protection and security on the information superhighway
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Protection and security on the information superhigway
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Linux System Security: An administrator's guide to Open Source Security Tools/ Scott Mann and Ellen L. Mitchell
Author: Mann, Scott; | Call Number: 005.43 Man l | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Evaluasi Security Operations Dan Perancangan Security Operations Center : Studi Kasus PT XYZ
Author: Ari Ahmad Syarif; | Call Number: KA-1213 (Softcopi KA-1206) MAK KA-859 | Edition: 2019 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Iformation systems security
Author: Fisher, Royal P.; | Call Number: 658.478 Fis | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Information networks: planning and design
Author: Etheridge, David; | Call Number: 004.6 Eth i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
6
7
8
9
10
11
12
13
14
15
Next