Your search for 1957 returns 4218 document(s) |
Applied cryptography: protocols, algorithms and source code in C |
Author: Schneier, Bruce; | Call Number: 005.82 Sch a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied cryptography: protocols, algorithms, and sources code in C |
Author: Schmeier, Bruce; | Call Number: 005.82 Sch a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography: a primer |
Author: Konheim, Alan G.; | Call Number: 526 Kon c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Digital certificates: applied internet security |
Author: Feghhi, Jalal; | Call Number: 005.8 Feg d | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Digital certificates: applied internet security |
Author: Feghhi, Jalal; | Call Number: 005.8 Feg d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Internet security made easy: a plain english guide to protecting yourself and your company online/Douglas Schwitzer |
Author: Schweitzer, Douglas; | Call Number: 005.8 Sch i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer network security: theory and practice/ Jie Wang |
Author: Wang Jie; | Call Number: 005.8 Wan c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer and information security handbook |
Author: Vacca, John R.; | Call Number: 005.8 Vac c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and Network security principles and practice 4th ed. (INSTRUCTOR'S MANUAL) |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Instructor's Manual
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security risk management building an information security risk management program from the ground up |
Call Number: 005.8 Whe s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|