Your search for 3065 returns 4191 document(s) |
Network security: how to plan for it and achive it |
Author: Baker, Richard H.; | Call Number: 658.478 Bak n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer network security: theory and practice/ Jie Wang |
Author: Wang Jie; | Call Number: 005.8 Wan c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and Network security principles and practice 3rd ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and Network security principles and practice 2nd ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and network security: principles and practice 6th ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and Network security: principles and practice 5th ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and Network security: principles and practice 4th ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
CyBOK: Cyber Security Body of Knowledge version 2.1 |
Author: Rashid, Awais; Danezis, George; Chivers, Howard; Lupu, Emil; Martin, Andrew; | Call Number: 005.8 Ras c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
CyBOK: The Cyber Security Body of Knowledge version 1.0 |
Call Number: 005.8 Cyb | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security risk management building an information security risk management program from the ground up |
Call Number: 005.8 Whe s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|