Search Result
Save to File
Your search for
10859
returns
3408
document(s)
Verifikasi protokol otentikasi Horn-Preneel menggunakan A VISPA (Automated Validation of Internet Security Protocols and Applications)
Author: Ilham Kurnia; | Call Number: SK-0618 (Softkopi SK-99) Source Code SK-88 | Type: Skripsi
Find Similar
|
Add To Favorites
|
Detail in New Window
Internet security made easy: a plain english guide to protecting yourself and your company online/Douglas Schwitzer
Author: Schweitzer, Douglas; | Call Number: 005.8 Sch i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Inside Internet Security: What hackers don't want you to know.../Jeff Crume
Author: Crume, Jeff; | Call Number: 005.8 Cru i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Pengecekan model protokol pembayaran mikro horn-preneel dengan menggunakan NuSMV
Author: Dhian Widya; | Call Number: T-0685 (Softcopy T-0339) Source Code T-0057 | Edition: 2008 | Type: Tesis
Find Similar
|
Add To Favorites
|
Detail in New Window
Smart card security and applications/Mike Hendry
Author: Hendry, Mike; | Call Number: 006 Hen s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Security monitoring
Author: Fry, Chris; | Call Number: 005.8 Fry s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer and information security handbook
Author: Vacca, John R.; | Call Number: 005.8 Vac c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
DNS security management
Author: Dooley, Michael; | Call Number: 005.8 Doo d | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Professional web services security
Call Number: 005.8 Pro | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Principles of information security 5th ed.
Author: Whitman, Michael E.; | Call Number: 005.8 Whi p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev 1
2
3
4
5
6
7
8
9
10
Next