Your search for 2649 returns 6449 document(s) |
Information security management : Concepts and Practice |
Author: Raggad, Bel G.; | Call Number: 005.8 Rag i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer security principles and practice 3 rd ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer security principles and practice 4 th ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Tutorial: the security of data in networks/ Donald W. Davies |
Call Number: 005.8 Dav t | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Shellcoder's handbook: discovering and exploiting security holes 2nd ed. |
Call Number: 005.8 She | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Basics of information security: understanding the fundamentals of infosec in theory and practice 2nd ed. |
Author: Andress, Jason; | Call Number: 005.8 And b | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer security basics/editor Deborah Russell and G.T. Gangemi S.R. |
Call Number: 005.8 Com | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network security: private communication in a public world/Charlie Kaufmann ...[et.al] |
Author: Kaufman, Charlie; | Call Number: 005.8 Kau n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information security and privacy: third Australian conference, ACISP'98/Brisbane, Australia, July 13-15, 1998 proceedings |
Call Number: 005.8 Inf | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Enterprise security architecture: a business-driven approach |
Author: Sherwood, John; | Call Number: 005.8 She e | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|