Search Result
Save to File
Your search for
1957
returns
4226
document(s)
IT auditing : using controls to protect iformation assets 2nd ed
Author: Davis, Chris; | Call Number: 658.05 Dav i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Application software recovery CD ROM
Call Number: 004.145 Hpb | Type: Software Program
Find Similar
|
Add To Favorites
|
Detail in New Window
Verifikasi protokol otentikasi Horn-Preneel menggunakan A VISPA (Automated Validation of Internet Security Protocols and Applications)
Author: Ilham Kurnia; | Call Number: SK-0618 (Softkopi SK-99) Source Code SK-88 | Type: Skripsi
Find Similar
|
Add To Favorites
|
Detail in New Window
Smart card security and applications/Mike Hendry
Author: Hendry, Mike; | Call Number: 006 Hen s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Advances in computer security management/Editor Thomas A. Rullo
Call Number: 658.478 Adv | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Source code info magic
Call Number: 005.3 Sou | Type: Softcopy Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Internet & TCP/IP network security: securing protocols and applications/Uday I. Prabai, Vijay K. Garbani
Author: Pabrai, Uday I.; | Call Number: 005.8 Pab i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer/ D.W. Davies
Author: Davies, Donald Watts; | Call Number: 384 Dav s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer fraud and cuntermeasures/ Leonard I. Krauss
Author: Krauss, Leonard I.; | Call Number: 364.168 Kra c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Algorithms
Author: Johnsonbaugh, Richard; | Call Number: 005.1 Joh a | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
2
3
4
5
6
7
8
9
10
11
Next