Your search for 2649 returns 6521 document(s) |
Network security: data and voice communications/Fred Simonds |
Author: Simonds, Fred; | Call Number: 005.8 Sim n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Advances in information security and assurance: third international conference and workshops, ISA 2009 Seoul, Korea, June 2009 Proceedings |
Call Number: 005.8 Adv | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Verifikasi protokol otentikasi Horn-Preneel menggunakan A VISPA (Automated Validation of Internet Security Protocols and Applications) |
Author: Ilham Kurnia; | Call Number: SK-0618 (Softkopi SK-99) Source Code SK-88 | Type: Skripsi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer network security: second internaitonal workshop on mathematical methods, models and architectures for computer network security MMM-ACNS 2003 St Petersburg, Russia, Sept' 2003, Proceeding |
Call Number: 005.8 Com | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network security principles and practices: expert solutions for securing network infrastructures and VPNs/ Saadat Malik |
Author: Malik Saadat; | Call Number: 005. 8 Mal n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Advances in computer security management/Editor Thomas A. Rullo |
Call Number: 658.478 Adv | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secrets and Lies: Digital security in a Networked world whith new information about post 9/11 security |
Author: Schneier, I Bruce; | Call Number: 005.8 Sch s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Physical security for IT/ Michael Erbschloe |
Author: Erbschloe, Michael; | Call Number: 005.8 Erb p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Web security: a step-by step reference guide/Lincon D. Stein |
Author: Stein, Lincoln D.; | Call Number: 005.8 Ste w | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer and communications security: strategies for the 1990 |
Author: Cooper, James Arlin; | Call Number: 005.8 Coo c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|