Search Result Save to File Save as CSV
Your search for 10877 returns 5588 document(s)
The Shellcoder's handbook: discovering and exploiting security holes 2nd ed.
Call Number: 005.8 She | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information security architecture: an integrated approach to security in the organization 2nd ed.
Author: Killmeyer, Jan; | Call Number: 005.8 Kil i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Network application framework: design and arhictecture
Author: Grenberg, Eric; | Call Number: 004.6 Gre n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The Local network handbook/ edited by George R. Davis
Call Number: R. 004.6 Loc | Type: Buku Referensi
Find Similar |  Add To Favorites |  Detail in New Window 
Network fundamentals CCNA exploration labs and study guide
Author: Rufi, Antoon W.; | Call Number: 004.607 6 Ruf n | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Network fundamentals CCNA exploration labs and study guide
Author: Rufi, Antoon W.; | Call Number: 004.607 6 Ruf n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Penjabaran Teknis dari Kebijakan Keamanan Jaringan Enterprise
Author: Niken Dwi Wahyu Cahyani; | Call Number: T-0478 (Softcopy Scan T-0033) | Edition: 2004 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Data communications and networking 5th ed.
Author: Forouzan, Behrouz A.; | Call Number: 004.6 For d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
CyBOK: Cyber Security Body of Knowledge version 2.1
Author: Rashid, Awais; Danezis, George; Chivers, Howard; Lupu, Emil; Martin, Andrew; | Call Number: 005.8 Ras c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
CyBOK: The Cyber Security Body of Knowledge version 1.0
Call Number: 005.8 Cyb | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   4 5 6 7 8 9 10 11 12 13  Next