Search Result
Save to File
Your search for
10389
returns
1878
document(s)
Cryptography: a new dimension in computer data security: a guide for the design and implementation of secure systems
Author: Meyer, Carl H.; | Call Number: 652.8 Mey c | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Applied cryptography: protocols, algorithms and source code in C
Author: Schneier, Bruce; | Call Number: 005.82 Sch a | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Penjabaran Teknis dari Kebijakan Keamanan Jaringan Enterprise
Author: Niken Dwi Wahyu Cahyani; | Call Number: T-0478 (Softcopy Scan T-0033) | Edition: 2004 | Type: Tesis
Find Similar
|
Add To Favorites
|
Detail in New Window
Cryptography and Data Security
Author: Denning, Dorothy E.; | Call Number: 005.8 Den c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Security risk management building an information security risk management program from the ground up
Call Number: 005.8 Whe s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Security monitoring
Author: Fry, Chris; | Call Number: 005.8 Fry s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Principles of information security 3rd ed.
Author: Whitman, Michael E.; | Call Number: 005.8 Whi p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
DNS security management
Author: Dooley, Michael; | Call Number: 005.8 Doo d | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Practical firewalls/Terry William Ogletree
Author: Ogletree, Terry William; | Call Number: 005.8 Ogl p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Professional web services security
Call Number: 005.8 Pro | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
1
2
3
4
5
6
7
8
9
10
Next