Your search for 31025 returns 5379 document(s) |
Web security: a step-by step reference guide/Lincon D. Stein |
Author: Stein, Lincoln D.; | Call Number: 005.8 Ste w | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information security management: implementation and global standard (ISO-2700) |
Author: Jivika Govil; Jivesh Govil; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Internet & TCP/IP network security: securing protocols and applications/Uday I. Prabai, Vijay K. Garbani |
Author: Pabrai, Uday I.; | Call Number: 005.8 Pab i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Executive guide to preventing information technology disasters/Richard Ennals |
Author: Ennals, Richard; | Call Number: 658.478 Enn e | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Database security/Silvano Castano |
Call Number: 005.8 Dat | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Data Protection And Employee Behavior: The Role Of Information Systems Security Culture (516-520) |
Author: Lena Connolly
Michael Lang; | Call Number: SEM-329 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security Architecture Design, Development & Operations |
Author: King, Christopher M.; | Call Number: 621.389 28 Kin s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security in communication networks/ Stelvio Cimato |
Author: Gimato, Stelvio; Galdi, Clemente; Persiano, Giuseppe; | Call Number: 005.8 Sec | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Hacking: the art of exploitation 2nd ed. |
Author: Erickson, Jon; | Call Number: 005.8 Eri h | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Hacking: the art of exploitation 2nd ed. |
Author: Erickson, Jon; | Call Number: 005.8 Eri h | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|