Your search for 32103 returns 4963 document(s) |
Principles of information security 4th ed. |
Author: Whitman, Michael E.; | Call Number: 005.8 Whi p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Introduction to network security theory and practice |
Author: Wang, Jie; | Call Number: 005.8 Wan i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Management of information security 3rd ed. |
Author: Whitman, Michael E.; | Call Number: 005.8 Whi m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network security: how to plan for it and achive it |
Author: Baker, Richard H.; | Call Number: 658.478 Bak n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network security essentials applications and standards 2nd ed. |
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer network security: theory and practice/ Jie Wang |
Author: Wang Jie; | Call Number: 005.8 Wan c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network security in the'90s :issues and solutions for managers/Thomas W. Madron |
Author: Madron, Thomas William; | Call Number: 005.8 Mad n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Inside network perimeter security: the definitve guide to firewalls, VPNs, routers, and instruction Detection |
Author: Northcutt, Stephen...[et. al.]; | Call Number: 005.8 Ins | Edition: 2003 | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied cryptography and network security : first internal conference ACNS 2003, Kunnings, China, October 16-19, 2003, Proceedings |
Author: Zhou, Jianjing; | Call Number: 005.8 Zho o | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and computational number theory |
Call Number: 005.8 Cry | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|