Search Result
Save to File
Your search for
13999
returns
3842
document(s)
Introduction to network security theory and practice
Author: Wang, Jie; | Call Number: 005.8 Wan i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Firewalls and internet security: repellinghthewily hacker
Author: Cheswick, William R.; | Call Number: 005.8 Che f | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Management of information security 3rd ed.
Author: Whitman, Michael E.; | Call Number: 005.8 Whi m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Information security risk analysis/Thomas R.
Author: Poltier, Thomas R.; | Call Number: 005.8 Pel i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Database security and integrity/ Eduardo B. Fernandez
Author: Fernandez, Eduardo B.; | Call Number: 005.74 Fer d | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer and communications security: strategies for the 1990
Author: Cooper, James Arlin; | Call Number: 005.8 Coo c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Information security an integrated collection of essaysl
Call Number: 005.8 Inf | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
ASP/MTS/ADSI web security
Author: Harrison, Richard; | Call Number: 005.86 Har a | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Principles of data security/ Ernst L. Leiss
Author: Leiss, Ernst L.; | Call Number: 05.8 Lei p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Microsoft windows security resource kit
Author: Smith, Ben; | Call Number: 005.8 Smi m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
18
19
20
21
22
23
24
25
26
27
Next