Your search for 3503 returns 5853 document(s) |
Secrets and Lies: Digital security in a Networked world whith new information about post 9/11 security |
Author: Schneier, I Bruce; | Call Number: 005.8 Sch s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Expert systems: principles and programming 3rd ed. |
Author: Giarratane, Joseph C.; | Call Number: 006.33 Gia e | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Expert systems: principles and programming 3rd ed. |
Author: Giarratano, Joseph C.; | Call Number: 006.33 Gia e | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer security basics/editor Deborah Russell and G.T. Gangemi S.R. |
Call Number: 005.8 Com | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Networking with microsoft TCP/IP 3rd ed/Drew Heywood |
Author: Heywood, Drew; | Call Number: 004.6 Hey n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Risk management for computer security: protecting your network and information assets |
Author: Jones, Andy; | Call Number: 658.478 Jon r | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Electronic commerce relationships: trust by design/Peter Keen |
Call Number: 005.8 Ele | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information security and privacy: third Australian conference, ACISP'98/Brisbane, Australia, July 13-15, 1998 proceedings |
Call Number: 005.8 Inf | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer communications: architecture, protocols and standards 3rd ed. |
Author: Stallings, William; | Call Number: 004.6 Sta c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Hacking: the art of exploitation 2nd ed. |
Author: Erickson, Jon; | Call Number: 005.8 Eri h | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|