Search Result
Save to File
Your search for
1957
returns
4218
document(s)
Computer security handbook/editor Arthur, E. Hutt Seymour
Call Number: R.658.478 02 Com | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Introduction to network security theory and practice
Author: Wang, Jie; | Call Number: 005.8 Wan i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Protection and security on the information superhighway
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Hacking: the art of exploitation 2nd ed.
Author: Erickson, Jon; | Call Number: 005.8 Eri h | Type: Softcopy Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer security principles and practice 3 rd ed.
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
The Shellcoder's handbook: discovering and exploiting security holes 2nd ed.
Call Number: 005.8 She | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Managing risk in information systems
Author: Gibson, Darril; | Call Number: 005.8 Gib m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Corporate computer security 4th ed.
Author: Boyle, Randall J.; | Call Number: 005.8 Boy c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Managing risk in information systems 2nd ed.
Author: Gibson, Darril; | Call Number: 005.8 Gib m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer security principles and practice 4 th ed.
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
3
4
5
6
7
8
9
10
11
12
Next