Search Result
Save to File
Your search for
13422
returns
3764
document(s)
Physical security for IT/ Michael Erbschloe
Author: Erbschloe, Michael; | Call Number: 005.8 Erb p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Database security/Silvano Castano
Call Number: 005.8 Dat | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Professional web services security
Call Number: 005.8 Pro | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Corporate computer and network security
Author: Panko, Raymond; | Call Number: 005.8 Pan c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
IPng and the TCP/IP protocols: implementating the next generation internet
Author: Thomas, Stephen A.; | Call Number: 004.6 Tho i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Essential email standards: RFCs and protocols made practical/Pete Loshin
Author: Loshin, Pete; | Call Number: 004.692 Los e | Type: Softcopy Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Performance analysis of three routing protocols for varying manet size, HAL. 935-939
Author: N. Vetrivelan; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Two prover protocols-low error at affordable rates,hal 172-183
Author: Uriel Feige; | Call Number: SEM-202 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Routing protocols and concepts CCNS exploration LABS and study guide
Author: Johnson, Allan; | Call Number: 004.6 Joh r | Type: Softcopy Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Using delayed commitment in locking protocols for real-time databases (hal 104 - 113)
Author: D.Agrawal, A. El Abbadi, R.Jeffers; | Call Number: SEM - 359 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
8
9
10
11
12
13
14
15
16
17
Next