Search Result
Save to File
Your search for
2649
returns
6451
document(s)
Smart card security and applications/Mike Hendry
Author: Hendry, Mike; | Call Number: 006 Hen s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Securing e-busniess applications and communications/ Jonathan S. Held
Author: Held, Jonathan S.; | Call Number: 658.84 Hel s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Maximum linux security: a hacker's guide to protecting your linux server and workstation
Author: Anonymous; | Call Number: 005.43 Ano m | Type: Softcopy Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Certified information security management (CISM Review Manual 2013)
Call Number: 658.478 Cer | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Certified information security management (Cism Review Manual 2015)
Call Number: 658.478 Cer | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Certified information security management (CISM Review Manual 2011)
Call Number: 658.478 Cer | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Applied cryptography: protocols, algorithms, and sources code in C
Author: Schmeier, Bruce; | Call Number: 005.82 Sch a | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Security in communication networks/ Stelvio Cimato
Author: Gimato, Stelvio; Galdi, Clemente; Persiano, Giuseppe; | Call Number: 005.8 Sec | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Information security management handbook 5th ed/ Harold Tipton F.
Call Number: 658.055 8 Inf | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Studi perencanaan manajemen proteksi keamanan internet banking
Author: Alfian Noor; | Call Number: PA-0029 (Softcopy PA-0029 | Edition: 2005 | Type: Proyek Akhir (PA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
9
10
11
12
13
14
15
16
17
18
Next