Your search for 3065 returns 4191 document(s) |
Applied cryptography: protocols, algorithms and source code in C |
Author: Schneier, Bruce; | Call Number: 005.82 Sch a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer security risk analysis and control a guide for the dp manager |
Author: Wong, KK; | Call Number: 658.47 Won r | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
National security versus data privacy and security: study of personal data privacy and security in Iran, HAL. 1081-1087 |
Author: Hassan Allpour and Ebrahim Kiani Harchegant; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Verifikasi protokol otentikasi Horn-Preneel menggunakan A VISPA (Automated Validation of Internet Security Protocols and Applications) |
Author: Ilham Kurnia; | Call Number: SK-0618 (Softkopi SK-99) Source Code SK-88 | Type: Skripsi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Inside network perimeter security: the definitve guide to firewalls, VPNs, routers, and instruction Detection |
Author: Northcutt, Stephen...[et. al.]; | Call Number: 005.8 Ins | Edition: 2003 | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied cryptography and network security : first internal conference ACNS 2003, Kunnings, China, October 16-19, 2003, Proceedings |
Author: Zhou, Jianjing; | Call Number: 005.8 Zho o | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analisa SI/TI security pada BPR/BKK pasca merger: studi kasus Bank PD. BPR BKK Talang merger |
Author: I Nyoman Jamin; | Call Number: KA-114 (Softcopy KA-114) | Edition: 2011 | Type: Karya Akhir (KA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Principles of data security/ Ernst L. Leiss |
Author: Leiss, Ernst L.; | Call Number: 05.8 Lei p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Smart card for Room Security System Using Single Board Computer Friendly ARM Mini 2440 |
Author: Enas Dhuhri Kusuma, Widyawan, Wahyu Prasetya; | Call Number: SEM-367 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Peningkatan Kesadaran Keamanan Informasi Pegawai dengan Pendekatan Knowledge Attitude Behavior (KAB) dan Human Aspects of Information Security Questionnaire (HAIS-Q): Studi Kasus Kementerian Komunikasi dan Informatika |
Author: Arif Wahyudi; | Call Number: KA-1714 (Softcopy KA-1705) MAK KA-1351 | Edition: 2023 | Type: Karya Akhir (KA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|