Search Result
Save to File
Your search for
2029
returns
6693
document(s)
Risk management for computer security: protecting your network and information assets
Author: Jones, Andy; | Call Number: 658.478 Jon r | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Security engineering: a guide to building dependable distributed systems
Author: Anderson, Ross; | Call Number: 005.8 And s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Information security management handbook 5th ed/ Harold Tipton F.
Call Number: 658.055 8 Inf | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer security principles and practice 3 rd ed.
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer security principles and practice 4 th ed.
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Tutorial: the security of data in networks/ Donald W. Davies
Call Number: 005.8 Dav t | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
The Shellcoder's handbook: discovering and exploiting security holes 2nd ed.
Call Number: 005.8 She | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer security basics/editor Deborah Russell and G.T. Gangemi S.R.
Call Number: 005.8 Com | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Network security: private communication in a public world/Charlie Kaufmann ...[et.al]
Author: Kaufman, Charlie; | Call Number: 005.8 Kau n | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Principles of data security/ Ernst L. Leiss
Author: Leiss, Ernst L.; | Call Number: 05.8 Lei p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
4
5
6
7
8
9
10
11
12
13
Next