Your search for 2832 returns 5312 document(s) |
Computer network security: theory and practice/ Jie Wang |
Author: Wang Jie; | Call Number: 005.8 Wan c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer network security: second internaitonal workshop on mathematical methods, models and architectures for computer network security MMM-ACNS 2003 St Petersburg, Russia, Sept' 2003, Proceeding |
Call Number: 005.8 Com | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security in computing |
Author: Pfleeger, Charles P.; | Call Number: 005.8 Pfl s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Protection and security on the information superhighway |
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Designing security architecture solution |
Author: Ramachandran, Jay; | Call Number: 005.8 Ram d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Risk management for computer security: protecting your network and information assets |
Author: Jones, Andy; | Call Number: 658.478 Jon r | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information security architecture: an integrated approach to security in the organization 2nd ed. |
Author: Killmeyer, Jan; | Call Number: 005.8 Kil i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Outsourcing information security/ C. Warren Axelrod |
Author: Axelrod C. Warren; | Call Number: 005.8 Axe o | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network and internetwork security principles and practice |
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Roadmap to information security: for it and infosec managers |
Author: Whitman, Michael E.; | Call Number: 005.8 Whi r | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|