Search Result Save to File Save as CSV
Your search for 2029 returns 6664 document(s)
Computer forensics: computer crime scene investigation
Author: Vacca, John R.; | Call Number: 363.259 68 Vac c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer forensics: computer crime scene investigation
Author: Vacca, John R.; | Call Number: 363.259 68 Vac c | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Trojans, Worms, and spyware: a computer security professional's guide to malicious code
Author: Erbschloe, Michael; | Call Number: 005.84 Erb t | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer fraud and cuntermeasures/ Leonard I. Krauss
Author: Krauss, Leonard I.; | Call Number: 364.168 Kra c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Iformation systems security
Author: Fisher, Royal P.; | Call Number: 658.478 Fis | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Protection techniques from information extraction
Author: Greco, Gianluigi; Ianni, Giovambattista | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Kajian aspek keamanan jaringan dalam era information superhighway, Hal. 1-8
Author: Jonathan Adipranoto; | Call Number: SEM-220 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Information retrieval: algorithms and heuristics 2nd ed.
Author: Grossman, David A.; | Call Number: 005.73 gro i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
CISSP: Cedrtified information systems security professional syudy guide 7th ed.
Author: Stewart, James Michael; | Call Number: 005.8 Ste c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Data communications for distributed information systems
Author: Chorafas, Dimitris N.; | Call Number: 004.6 Cho d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   10 11 12 13 14 15 16 17 18 19  Next