Your search for 29518 returns 7587 document(s) |
Data security through graphical authentication schemes, HAL. 1013-1024 |
Author: M.N. Djoja; Naveen Kumar; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
E-Commerce security strategies: protecting the enterprise |
Author: Cameron, Debra; | Call Number: 658.478 Cam e | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Microsoft windows security resource kit |
Author: Smith, Ben; | Call Number: 005.8 Smi m | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Microsoft windows security resource kit |
Author: Smith, Ben; | Call Number: 005.8 Smi m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Database: theory and practice/Lars Frank |
Author: Frank, Lars; | Call Number: 005.74 Fra d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied cryptography and network security: first international conf. ACNS 2003 Kunning, China, October 16-19, 2003 Proceedings |
Author: Zhou, Jianying; | Call Number: 005.8 Zho a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Maximum Linux security : [a hacker's guide to protecting your Linux server and workstation]/ Anonymous |
Author: Ray, John; | Call Number: 005.8 Ray m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Database security integrity |
Author: Fernandez, Eduardo B.; | Call Number: 005.74 Fer d | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Internet security made easy: a plain english guide to protecting yourself and your company online/Douglas Schwitzer |
Author: Schweitzer, Douglas; | Call Number: 005.8 Sch i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Business continuity planning for data centers and systems |
Author: Bowman, Ronald H.; | Call Number: 658.478 Bow b | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|