Your search for 10877 returns 5609 document(s) |
Introduction to network security theory and practice |
Author: Wang, Jie; | Call Number: 005.8 Wan i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Principles of information security 4th ed. |
Author: Whitman, Michael E.; | Call Number: 005.8 Whi p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Internet & TCP/IP network security: securing protocols and applications/Uday I. Prabai, Vijay K. Garbani |
Author: Pabrai, Uday I.; | Call Number: 005.8 Pab i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network and internet work security: principles and practice |
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied cryptography: protocols, algorithms and source code in C |
Author: Schneier, Bruce; | Call Number: 005.82 Sch a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network security: how to plan for it and achive it |
Author: Baker, Richard H.; | Call Number: 658.478 Bak n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network security in the'90s :issues and solutions for managers/Thomas W. Madron |
Author: Madron, Thomas William; | Call Number: 005.8 Mad n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Principles of information security 5th ed. |
Author: Whitman, Michael E.; | Call Number: 005.8 Whi p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Management of information security 5th ed. |
Author: Whitman, Michael E.; | Call Number: 005.8 Whi m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Management of information security 2nd ed. |
Author: Whitman, Michael E.; | Call Number: 005.8 Whi m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|