Search Result Save to File Save as CSV
Your search for 3503 returns 5853 document(s)
Secrets and Lies: Digital security in a Networked world whith new information about post 9/11 security
Author: Schneier, I Bruce; | Call Number: 005.8 Sch s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Expert systems: principles and programming 3rd ed.
Author: Giarratane, Joseph C.; | Call Number: 006.33 Gia e | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Expert systems: principles and programming 3rd ed.
Author: Giarratano, Joseph C.; | Call Number: 006.33 Gia e | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security basics/editor Deborah Russell and G.T. Gangemi S.R.
Call Number: 005.8 Com | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Networking with microsoft TCP/IP 3rd ed/Drew Heywood
Author: Heywood, Drew; | Call Number: 004.6 Hey n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Risk management for computer security: protecting your network and information assets
Author: Jones, Andy; | Call Number: 658.478 Jon r | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Electronic commerce relationships: trust by design/Peter Keen
Call Number: 005.8 Ele | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information security and privacy: third Australian conference, ACISP'98/Brisbane, Australia, July 13-15, 1998 proceedings
Call Number: 005.8 Inf | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer communications: architecture, protocols and standards 3rd ed.
Author: Stallings, William; | Call Number: 004.6 Sta c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Hacking: the art of exploitation 2nd ed.
Author: Erickson, Jon; | Call Number: 005.8 Eri h | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   6 7 8 9 10 11 12 13 14 15  Next