Search Result Save to File Save as CSV
Your search for 32583 returns 6865 document(s)
Roadmap to information security: for it and infosec managers
Author: Whitman, Michael E.; | Call Number: 005.8 Whi r | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The Shellcoder's handbook: discovering and exploiting security holes 2nd ed.
Call Number: 005.8 She | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Corporate computer security 4th ed.
Author: Boyle, Randall J.; | Call Number: 005.8 Boy c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information security management : Concepts and Practice
Author: Raggad, Bel G.; | Call Number: 005.8 Rag i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer and communications security: strategies for the 1990
Author: Cooper, James Arlin; | Call Number: 005.8 Coo c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information security architecture: an integrated approach to security in the organization 2nd ed.
Author: Killmeyer, Jan; | Call Number: 005.8 Kil i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Handbook of human computer interaction/edited by Martin Helander
Call Number: R. 004.019 02 Han | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Handbook of interactive computer terminals/ Duane E. Sharp
Author: Sharp Duane E.; | Call Number: R. 621.381 9 Sha h | Type: Buku Referensi
Find Similar |  Add To Favorites |  Detail in New Window 
Computer fraud and cuntermeasures/ Leonard I. Krauss
Author: Krauss, Leonard I.; | Call Number: 364.168 Kra c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security principles and practice 3 rd ed.
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   3 4 5 6 7 8 9 10 11 12  Next