Search Result Save to File Save as CSV
Your search for 29667 returns 4734 document(s)
Digital certificates: applied internet security
Author: Feghhi, Jalal; | Call Number: 005.8 Feg d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer architecture a quantitative approach
Author: Patterson, David A.; | Call Number: 004.22 Pat c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Using the common criteria for it security evaluation/ Debra S. Hermann
Author: Hermann, Debra S.; | Call Number: 005.8 Her s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography and network security: principles and practice 3rd ed.
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Enterprise transaction processing systems: putting the CORBA OTS, ENCINA++ and OrbixOTM to work
Author: Gorton, Ian; | Call Number: 005.133 Gor e | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Firewalls and internet security: repellinghthewily hacker
Author: Cheswick, William R.; | Call Number: 005.8 Che f | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information security risk analysis/Thomas R.
Author: Poltier, Thomas R.; | Call Number: 005.8 Pel i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Security engineering: a guide to building dependable distributed systems
Author: Anderson, Ross; | Call Number: 005.8 And s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Maximum linux security: a hacker's guide to protecting your linux server and workstation
Author: Anonymous; | Call Number: 005.43 Ano m | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Certified information security management (CISM Review Manual 2013)
Call Number: 658.478 Cer | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   4 5 6 7 8 9 10 11 12 13  Next