Search Result Save to File Save as CSV
Your search for 2649 returns 6449 document(s)
Management of information security 2nd ed.
Author: Whitman, Michael E.; | Call Number: 005.8 Whi m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Principles of information security 4th ed.
Author: Whitman, Michael E.; | Call Number: 005.8 Whi p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Management of information security 3rd ed.
Author: Whitman, Michael E.; | Call Number: 005.8 Whi m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Network security: how to plan for it and achive it
Author: Baker, Richard H.; | Call Number: 658.478 Bak n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Building internet firewalls
Author: Zwicky, Elizabeth D.; | Call Number: 005.8 Zwi b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Building internet firewalls 2nd ed.
Author: Zwicky, Elizabeth D.; | Call Number: 005.8 Zwi b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer network security: theory and practice/ Jie Wang
Author: Wang Jie; | Call Number: 005.8 Wan c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Network security in the'90s :issues and solutions for managers/Thomas W. Madron
Author: Madron, Thomas William; | Call Number: 005.8 Mad n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Evaluasi infrastruktur keamanan jaringan retail internet banking: studi kasus di PT Bank XYZ Tbk.
Author: Ikrar Adinata Arin; | Call Number: T-0853 (Softcopy T-0507) | Edition: 2009 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
A Practical guide to security assessments/ Sudhanshu Kairab
Author: Kairab, Sudhanshu; | Call Number: 658.478 Kai p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next