Search Result
Save to File
Your search for
2649
returns
6521
document(s)
Inside Internet Security: What hackers don't want you to know.../Jeff Crume
Author: Crume, Jeff; | Call Number: 005.8 Cru i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Security engineering: a guide to building dependable distributed systems
Author: Anderson, Ross; | Call Number: 005.8 And s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Digital watermarking and steganography
Author: Cox, Ingemar J.; | Call Number: 005.8 Cox d | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Practical firewalls/Terry William Ogletree
Author: Ogletree, Terry William; | Call Number: 005.8 Ogl p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer/ D.W. Davies
Author: Davies, Donald Watts; | Call Number: 384 Dav s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Assessing and managing security risk in it systems: a structured methodology/ John Mccumber
Author: Mccumber, John; | Call Number: 005.8 Mcc a | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
IT manager's guide to virtual private networks/David Clark
Author: Clark, David Leon; | Call Number: 005.8 Cla i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Techniques and applications of digital watermarking and content protection
Author: Arnold, Michael; | Call Number: 005.8 Arn t | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Information hiding techniques for steganography and digital watermarking/ Stefan Katzenbeisser
Call Number: 005.8 Inf | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Introduction to network security theory and practice
Author: Wang, Jie; | Call Number: 005.8 Wan i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
4
5
6
7
8
9
10
11
12
13
Next