Your search for 2029 returns 6664 document(s) |
Computer forensics: computer crime scene investigation |
Author: Vacca, John R.; | Call Number: 363.259 68 Vac c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer forensics: computer crime scene investigation |
Author: Vacca, John R.; | Call Number: 363.259 68 Vac c | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Trojans, Worms, and spyware: a computer security professional's guide to malicious code |
Author: Erbschloe, Michael; | Call Number: 005.84 Erb t | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer fraud and cuntermeasures/ Leonard I. Krauss |
Author: Krauss, Leonard I.; | Call Number: 364.168 Kra c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Iformation systems security |
Author: Fisher, Royal P.; | Call Number: 658.478 Fis | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Protection techniques from information extraction |
Author: Greco, Gianluigi; Ianni, Giovambattista | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Kajian aspek keamanan jaringan dalam era information superhighway, Hal. 1-8 |
Author: Jonathan Adipranoto; | Call Number: SEM-220 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information retrieval: algorithms and heuristics 2nd ed. |
Author: Grossman, David A.; | Call Number: 005.73 gro i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
CISSP: Cedrtified information systems security professional syudy guide 7th ed. |
Author: Stewart, James Michael; | Call Number: 005.8 Ste c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Data communications for distributed information systems |
Author: Chorafas, Dimitris N.; | Call Number: 004.6 Cho d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|