Search Result Save to File Save as CSV
Your search for 10389 returns 1878 document(s)
Cryptography: a new dimension in computer data security: a guide for the design and implementation of secure systems
Author: Meyer, Carl H.; | Call Number: 652.8 Mey c | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Applied cryptography: protocols, algorithms and source code in C
Author: Schneier, Bruce; | Call Number: 005.82 Sch a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Penjabaran Teknis dari Kebijakan Keamanan Jaringan Enterprise
Author: Niken Dwi Wahyu Cahyani; | Call Number: T-0478 (Softcopy Scan T-0033) | Edition: 2004 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography and Data Security
Author: Denning, Dorothy E.; | Call Number: 005.8 Den c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Security risk management building an information security risk management program from the ground up
Call Number: 005.8 Whe s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Security monitoring
Author: Fry, Chris; | Call Number: 005.8 Fry s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Principles of information security 3rd ed.
Author: Whitman, Michael E.; | Call Number: 005.8 Whi p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
DNS security management
Author: Dooley, Michael; | Call Number: 005.8 Doo d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Practical firewalls/Terry William Ogletree
Author: Ogletree, Terry William; | Call Number: 005.8 Ogl p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Professional web services security
Call Number: 005.8 Pro | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next