Search Result Save to File Save as CSV
Your search for 2649 returns 6449 document(s)
Information security management : Concepts and Practice
Author: Raggad, Bel G.; | Call Number: 005.8 Rag i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security principles and practice 3 rd ed.
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security principles and practice 4 th ed.
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Tutorial: the security of data in networks/ Donald W. Davies
Call Number: 005.8 Dav t | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The Shellcoder's handbook: discovering and exploiting security holes 2nd ed.
Call Number: 005.8 She | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The Basics of information security: understanding the fundamentals of infosec in theory and practice 2nd ed.
Author: Andress, Jason; | Call Number: 005.8 And b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security basics/editor Deborah Russell and G.T. Gangemi S.R.
Call Number: 005.8 Com | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Network security: private communication in a public world/Charlie Kaufmann ...[et.al]
Author: Kaufman, Charlie; | Call Number: 005.8 Kau n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information security and privacy: third Australian conference, ACISP'98/Brisbane, Australia, July 13-15, 1998 proceedings
Call Number: 005.8 Inf | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Enterprise security architecture: a business-driven approach
Author: Sherwood, John; | Call Number: 005.8 She e | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   3 4 5 6 7 8 9 10 11 12  Next