Your search for 29518 returns 7585 document(s) |
Principles of information security 3rd ed. |
Author: Whitman, Michael E.; | Call Number: 005.8 Whi p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Management of information security 2nd ed. |
Author: Whitman, Michael E.; | Call Number: 005.8 Whi m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Principles of information security 4th ed. |
Author: Whitman, Michael E.; | Call Number: 005.8 Whi p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Management of information security 3rd ed. |
Author: Whitman, Michael E.; | Call Number: 005.8 Whi m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information integrity: a structure for its definition & management/ Hal B. Becker |
Author: Becker, Hal B.; | Call Number: 658.403 8 Bec i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Techniques and applications of digital watermarking and content protection |
Author: Arnold, Michael; | Call Number: 005.8 Arn t | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Digital watermarking and steganography |
Author: Cox, Ingemar J.; | Call Number: 005.8 Cox d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secrets and Lies: Digital security in a Networked world whith new information about post 9/11 security |
Author: Schneier, I Bruce; | Call Number: 005.8 Sch s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information security and privacy: third Australian conference, ACISP'98/Brisbane, Australia, July 13-15, 1998 proceedings |
Call Number: 005.8 Inf | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information security risk analysis/Thomas R. |
Author: Poltier, Thomas R.; | Call Number: 005.8 Pel i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|