Search Result
Save to File
Your search for
1957
returns
4226
document(s)
Designing security architecture solution
Author: Ramachandran, Jay; | Call Number: 005.8 Ram d | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Hacking: the art of exploitation 2nd ed.
Author: Erickson, Jon; | Call Number: 005.8 Eri h | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Outsourcing information security/ C. Warren Axelrod
Author: Axelrod C. Warren; | Call Number: 005.8 Axe o | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
The Basics of information security: understanding the fundamentals of infosec in theory and practice 2nd ed.
Author: Andress, Jason; | Call Number: 005.8 And b | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
ISO 27001 complete self-assessment guide: practical tools for self-assessment
Call Number: 005.8 Iso | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Secrets and Lies: Digital security in a Networked world whith new information about post 9/11 security
Author: Schneier, I Bruce; | Call Number: 005.8 Sch s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Information security architecture: an integrated approach to security in the organization 2nd ed.
Author: Killmeyer, Jan; | Call Number: 005.8 Kil i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer security : art and science
Author: Bishop, Matt; | Call Number: 005.8 Bis c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer security basics/editor Deborah Russell and G.T. Gangemi S.R.
Call Number: 005.8 Com | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Tutorial: the security of data in networks/ Donald W. Davies
Call Number: 005.8 Dav t | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
4
5
6
7
8
9
10
11
12
13
Next