Search Result
Save to File
Your search for
31155
returns
5601
document(s)
Hacking: the art of exploitation 2nd ed.
Author: Erickson, Jon; | Call Number: 005.8 Eri h | Type: Softcopy Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Corporate computer security 4th ed.
Author: Boyle, Randall J.; | Call Number: 005.8 Boy c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Hacking: the art of exploitation 2nd ed.
Author: Erickson, Jon; | Call Number: 005.8 Eri h | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Cryptography and Network security principles and practice 3rd ed. (INSTRUCTOR'S MANUAL)
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Instructor's Manual
Find Similar
|
Add To Favorites
|
Detail in New Window
Managing risk in information systems 2nd ed.
Author: Gibson, Darril; | Call Number: 005.8 Gib m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer network: a system approach
Author: Peterson, Larry L.; | Call Number: 004.65 Pet c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
E-learning in the 21st century: a community of inquiry framework for research and practice 3rd ed.
Author: Garrison, Randy D.; | Call Number: 378.1 Gar e | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
The Shellcoder's handbook: discovering and exploiting security holes 2nd ed.
Call Number: 005.8 She | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Information security architecture: an integrated approach to security in the organization 2nd ed.
Author: Killmeyer, Jan; | Call Number: 005.8 Kil i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Network application framework: design and arhictecture
Author: Grenberg, Eric; | Call Number: 004.6 Gre n | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
3
4
5
6
7
8
9
10
11
12
Next