Search Result
Save to File
Your search for
27889
returns
3699
document(s)
Analisis security wap 1-2 dan implementasi otentikasi pada prototipe aplikasi mobile banking
Author: Imam Narasamdya; | Call Number: KP-0134 | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Googling security: how much does google know about you
Author: Conti, Greg; | Call Number: 005.8 Con g | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
The Shellcoder's handbook: discovering and exploiting security holes 2nd ed.
Call Number: 005.8 She | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Certified information security management (CISM Review Manual 2013)
Call Number: 658.478 Cer | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Certified information security management (Cism Review Manual 2015)
Call Number: 658.478 Cer | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Information assurance for the enterprise: a roadmap to information security/ Corey Schou
Author: Schou, Corey; | Call Number: 005.8 Sch c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
The Basics of information security: understanding the fundamentals of infosec in theory and practice 2nd ed.
Author: Andress, Jason; | Call Number: 005.8 And b | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
CWSP: Certified Wireless Security Profesional official study guide
Call Number: 005.807 6 Cws | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
CISSP: Cedrtified information systems security professional syudy guide 7th ed.
Author: Stewart, James Michael; | Call Number: 005.8 Ste c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Information security management handbook 5th ed/ Harold Tipton F.
Call Number: 658.055 8 Inf | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
17
18
19
20
21
22
23
24
25
26
Next