Search Result
Save to File
Your search for
10859
returns
3194
document(s)
Information security risk analysis/Thomas R.
Author: Poltier, Thomas R.; | Call Number: 005.8 Pel i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Using the common criteria for it security evaluation/ Debra S. Hermann
Author: Hermann, Debra S.; | Call Number: 005.8 Her s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Web security: a step-by step reference guide/Lincon D. Stein
Author: Stein, Lincoln D.; | Call Number: 005.8 Ste w | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Digital certificates: applied internet security
Author: Feghhi, Jalal; | Call Number: 005.8 Feg d | Type: Softcopy Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Digital certificates: applied internet security
Author: Feghhi, Jalal; | Call Number: 005.8 Feg d | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Protokol Otentikasi "Kerberos" pada Electronic Payment (E-Payment) (225-232)
Author: Dian Wirdasari Yunita Syahfitri; | Call Number: SEM-312 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Cryptography and network security: principles and practice 3rd ed.
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Advances in computer security management/Editor Thomas A. Rullo
Call Number: 658.478 Adv | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
CWSP: Certified Wireless Security Profesional official study guide
Call Number: 005.807 6 Cws | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Application software recovery CD ROM
Call Number: 004.145 Hpb | Type: Software Program
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
1
2
3
4
5
6
7
8
9
10
Next