Search Result Save to File Save as CSV
Your search for 1893 returns 6620 document(s)
Microsoft windows security resource kit
Author: Smith, Ben; | Call Number: 005.8 Smi m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Applied cryptography and network security: first international conf. ACNS 2003 Kunning, China, October 16-19, 2003 Proceedings
Author: Zhou, Jianying; | Call Number: 005.8 Zho a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Maximum Linux security : [a hacker's guide to protecting your Linux server and workstation]/ Anonymous
Author: Ray, John; | Call Number: 005.8 Ray m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information security an integrated collection of essaysl
Call Number: 005.8 Inf | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography and Data Security
Author: Denning, Dorothy E.; | Call Number: 005.8 Den c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Introduction to health information privacy and security
Author: Rinehart-Thompson, Laurie A.; | Call Number: 610.68 Rin i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Microsoft windows security inside out for windows XP and windows 2000
Author: Bott, Ed; | Call Number: 005.8 Bot m | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Microsoft windows security inside out for windows XP and windows 2000
Author: Bott, Ed; | Call Number: 005.8 Bot m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information warfare and security/Dorothy E. Denning
Author: Denning, Dorothy E.R.; | Call Number: 355.343 Den i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Applied cryptography: protocols, algorithms, and sources code in C
Author: Schmeier, Bruce; | Call Number: 005.82 Sch a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   7 8 9 10 11 12 13 14 15 16  Next