Your search for 2133 returns 4205 document(s) |
Network security: how to plan for it and achive it |
Author: Baker, Richard H.; | Call Number: 658.478 Bak n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer network security: theory and practice/ Jie Wang |
Author: Wang Jie; | Call Number: 005.8 Wan c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Building secure and reliable network applicatins/Kenneth P. Birman |
Author: Birman, Kenneth P.; | Call Number: 004.36 Bir b | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Internet firewalls and network security/R. Christopher E. Hare ...[et.al] |
Author: Siyan, Karanjit; Hare, R. Christhoper E.; | Call Number: 005.8 Siy i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network security: data and voice communications/Fred Simonds |
Author: Simonds, Fred; | Call Number: 005.8 Sim n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network and internet work security: principles and practice |
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer and information security handbook |
Author: Vacca, John R.; | Call Number: 005.8 Vac c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Principles of information security 5th ed. |
Author: Whitman, Michael E.; | Call Number: 005.8 Whi p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Management of information security 5th ed. |
Author: Whitman, Michael E.; | Call Number: 005.8 Whi m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Readings and cases in the management of information security |
Author: Whitman, Michael E.; | Call Number: 005.8 Whi r | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|