Search Result Save to File Save as CSV
Your search for 10387 returns 1362 document(s)
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer/ D.W. Davies
Author: Davies, Donald Watts; | Call Number: 384 Dav s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security
Author: editors Virginia, Alexandria; | Call Number: 005.8 Com | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security
Author: Golddmann, Dieter; | Call Number: 005.8 Gol c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Security in computing
Author: Pfleeger, Charles P.; | Call Number: 005.8 Pfl s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Lotus notes and domino 4.5 architecture, adminstration, and security/Scott L. Thomas < Bradley
Author: Thomas, Scott L.; | Call Number: 005.369 Tho l | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Protection and security on the information superhighway
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Designing security architecture solution
Author: Ramachandran, Jay; | Call Number: 005.8 Ram d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security : art and science
Author: Bishop, Matt; | Call Number: 005.8 Bis c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Database security/Silvano Castano
Call Number: 005.8 Dat | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Corporate computer and network security
Author: Panko, Raymond; | Call Number: 005.8 Pan c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next