Search Result Save to File Save as CSV
Your search for 13422 returns 3764 document(s)
Physical security for IT/ Michael Erbschloe
Author: Erbschloe, Michael; | Call Number: 005.8 Erb p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Database security/Silvano Castano
Call Number: 005.8 Dat | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Professional web services security
Call Number: 005.8 Pro | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Corporate computer and network security
Author: Panko, Raymond; | Call Number: 005.8 Pan c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
IPng and the TCP/IP protocols: implementating the next generation internet
Author: Thomas, Stephen A.; | Call Number: 004.6 Tho i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Essential email standards: RFCs and protocols made practical/Pete Loshin
Author: Loshin, Pete; | Call Number: 004.692 Los e | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Performance analysis of three routing protocols for varying manet size, HAL. 935-939
Author: N. Vetrivelan; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Two prover protocols-low error at affordable rates,hal 172-183
Author: Uriel Feige; | Call Number: SEM-202 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Routing protocols and concepts CCNS exploration LABS and study guide
Author: Johnson, Allan; | Call Number: 004.6 Joh r | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Using delayed commitment in locking protocols for real-time databases (hal 104 - 113)
Author: D.Agrawal, A. El Abbadi, R.Jeffers; | Call Number: SEM - 359 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   8 9 10 11 12 13 14 15 16 17  Next