Search Result Save to File Save as CSV
Your search for 25347 returns 3902 document(s)
Computer and information security handbook
Author: Vacca, John R.; | Call Number: 005.8 Vac c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer Fraud & Security Bulletin
Call Number: [6 (1983): 1,2,4-12, 6 (1984): 6, 7 (1984): 1-12, 8 (1985): 1-9,12, 9 (1986): 1-12, 10 (1987): 1-3, 10 (1987): 1-3] | Type: Jurnal/ Majalah
Find Similar |  Add To Favorites |  Detail in New Window 
Computer Security Journal
Call Number: 11 (1983): 1 | Type: Jurnal/ Majalah
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security : art and science
Author: Bishop, Matt; | Call Number: 005.8 Bis c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Corporate computer and network security
Author: Panko, Raymond; | Call Number: 005.8 Pan c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
ITI security management/
Call Number: 658.403 8 Caz i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
DNS security management
Author: Dooley, Michael; | Call Number: 005.8 Doo d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Design and delivery of undergraduate IT security management course, (LNCS-Lecture Notes in Computer Science 5576) Hal. 402-411
Author: Jemal H. Abawaijy; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Corporate computer security 4th ed.
Author: Boyle, Randall J.; | Call Number: 005.8 Boy c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer and communications security: strategies for the 1990
Author: Cooper, James Arlin; | Call Number: 005.8 Coo c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next