Your search for 2832 returns 5301 document(s) |
Tutorial: the security of data in networks/ Donald W. Davies |
Call Number: 005.8 Dav t | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secrets and Lies: Digital security in a Networked world whith new information about post 9/11 security |
Author: Schneier, I Bruce; | Call Number: 005.8 Sch s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Advances in computer security management/Editor Thomas A. Rullo |
Call Number: 658.478 Adv | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Shellcoder's handbook: discovering and exploiting security holes 2nd ed. |
Call Number: 005.8 She | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Basics of information security: understanding the fundamentals of infosec in theory and practice 2nd ed. |
Author: Andress, Jason; | Call Number: 005.8 And b | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network security: private communication in a public world/Charlie Kaufmann ...[et.al] |
Author: Kaufman, Charlie; | Call Number: 005.8 Kau n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security monitoring |
Author: Fry, Chris; | Call Number: 005.8 Fry s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information security and privacy: third Australian conference, ACISP'98/Brisbane, Australia, July 13-15, 1998 proceedings |
Call Number: 005.8 Inf | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network security principles and practices: expert solutions for securing network infrastructures and VPNs/ Saadat Malik |
Author: Malik Saadat; | Call Number: 005. 8 Mal n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Trojans, Worms, and spyware: a computer security professional's guide to malicious code |
Author: Erbschloe, Michael; | Call Number: 005.84 Erb t | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|