Your search for 27889 returns 3695 document(s) |
Secrets and Lies: Digital security in a Networked world whith new information about post 9/11 security |
Author: Schneier, I Bruce; | Call Number: 005.8 Sch s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Linux System Security: An administrator's guide to Open Source Security Tools/ Scott Mann and Ellen L. Mitchell |
Author: Mann, Scott; | Call Number: 005.43 Man l | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer/ D.W. Davies |
Author: Davies, Donald Watts; | Call Number: 384 Dav s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Evaluasi Security Operations Dan Perancangan Security Operations Center : Studi Kasus PT XYZ |
Author: Ari Ahmad Syarif; | Call Number: KA-1213 (Softcopi KA-1206) MAK KA-859 | Edition: 2019 | Type: Karya Akhir (KA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Lab Security Fasilkom UI (CCSC UI -- Center fro Cyber Security and Cryptography, Universitas Indonesia) |
Author: Febriananda Wida Pramudita; | Call Number: KP-3346 | Type: Kerja Praktek (KP)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Standby developer top ads, security (Fraud), shops administration, help, security (general) |
Author: Septi Rito Tombe; | Call Number: KP-2085 (Softcopy KP-1647) | Type: Kerja Praktek (KP)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Study on the Preparedness of Information Security Framework Area based on the Assessment of Information Security Index in Ministry of XYZ (55-60) |
Author: Mufti Rizal
Yudho Giri Sucahyo; | Call Number: SEM-319 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Lotus notes and domino 4.5 architecture, adminstration, and security/Scott L. Thomas < Bradley |
Author: Thomas, Scott L.; | Call Number: 005.369 Tho l | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Maximum linux security: a hacker's guide to protecting your linux server and workstation |
Author: Anonymous; | Call Number: 005.43 Ano m | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and Network security principles and practice 3rd ed. (INSTRUCTOR'S MANUAL) |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Instructor's Manual
|
Find Similar |
Add To Favorites |
Detail in New Window
|