Your search for 1861 returns 4168 document(s) |
Building secure and reliable network applicatins/Kenneth P. Birman |
Author: Birman, Kenneth P.; | Call Number: 004.36 Bir b | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Internet firewalls and network security/R. Christopher E. Hare ...[et.al] |
Author: Siyan, Karanjit; Hare, R. Christhoper E.; | Call Number: 005.8 Siy i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied cryptography and network security: first international conf. ACNS 2003 Kunning, China, October 16-19, 2003 Proceedings |
Author: Zhou, Jianying; | Call Number: 005.8 Zho a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
IT manager's guide to virtual private networks/David Clark |
Author: Clark, David Leon; | Call Number: 005.8 Cla i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security issues for the internet and the word wide web |
Author: Cameron, Debra; | Call Number: 005.8 Cam s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Protection and security on the information superhighway |
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer forensics: computer crime scene investigation |
Author: Vacca, John R.; | Call Number: 363.259 68 Vac c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer forensics: computer crime scene investigation |
Author: Vacca, John R.; | Call Number: 363.259 68 Vac c | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Protection and security on the information superhigway |
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer forensics: incident reponse essentials/ Warren G. Kruse II |
Author: Kruse II, Warren G.; | Call Number: 005.8 Kru c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|