Search Result Save to File Save as CSV
Your search for 10877 returns 5588 document(s)
A Practical guide to security assessments/ Sudhanshu Kairab
Author: Kairab, Sudhanshu; | Call Number: 658.478 Kai p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Mengenal local area network (LAN)/Lukas Tanutama dan Hosea Tanutama
Author: Tanutama, Lukas; | Call Number: 004.68 Tan m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Communication network
Author: Leon-Garcia, Alberto; | Call Number: 621.382 1 Leo c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography theory and practice 3rd ed.
Author: Stinson, Douglas R.; | Call Number: 005.8 Sti c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Using the common criteria for it security evaluation/ Debra S. Hermann
Author: Hermann, Debra S.; | Call Number: 005.8 Her s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
CISSP Certification: exam guide all in one, 4th ed ;
Author: Harris , Shon; | Call Number: 005.8 Har c; | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information security management handbook 4th ed./ editor Harold F. Tiptop
Call Number: 658.055 8 Inf | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information security management : Concepts and Practice
Author: Raggad, Bel G.; | Call Number: 005.8 Rag i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Neural network:A Comprehensive Foundation
Author: Haykin, Simon; | Call Number: 006.32 Hay n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Local area network design
Author: Hopper, A.; | Call Number: 621.398 1 Hop l | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   6 7 8 9 10 11 12 13 14 15  Next