Search Result Save to File Save as CSV
Your search for 27889 returns 3695 document(s)
Principles of data security/ Ernst L. Leiss
Author: Leiss, Ernst L.; | Call Number: 05.8 Lei p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Microsoft windows security resource kit
Author: Smith, Ben; | Call Number: 005.8 Smi m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Network and internetwork security principles and practice
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Security in communication networks/ Stelvio Cimato
Author: Gimato, Stelvio; Galdi, Clemente; Persiano, Giuseppe; | Call Number: 005.8 Sec | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information warfare and security/Dorothy E. Denning
Author: Denning, Dorothy E.R.; | Call Number: 355.343 Den i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Roadmap to information security: for it and infosec managers
Author: Whitman, Michael E.; | Call Number: 005.8 Whi r | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
E-Commerce security strategies: protecting the enterprise
Author: Cameron, Debra; | Call Number: 658.478 Cam e | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security management/ Donn B. Parker
Author: Parker, Donn B.; | Call Number: 658.478 Par c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Network security: how to plan for it and achive it
Author: Baker, Richard H.; | Call Number: 658.478 Bak n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Privacy, security, and the information processing industry
Call Number: SEM-097 | Type: Prosiding Seminar
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   8 9 10 11 12 13 14 15 16 17  Next