Search Result
Save to File
Your search for
3503
returns
5853
document(s)
Implementing elliptic curve cryptography/Michael Rosing
Author: Rosing, Michael; | Call Number: 005.82 Ros i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Applied data communications : a business -oriented approach 3rd ed.
Author: Goldman, James E.; | Call Number: 658.054 6 Gol a | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Security engineering: a guide to building dependable distributed systems
Author: Anderson, Ross; | Call Number: 005.8 And s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Information security management handbook 5th ed/ Harold Tipton F.
Call Number: 658.055 8 Inf | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Mobile IP: design principles and practices
Author: Perkins, Charles E.; | Call Number: 004.62 Per m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Principles of protocol engineering and conformance testing
Author: Sarikaya, Behcet; | Call Number: 00571 Sar p | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Practical neural network recipes in c++/ Timothy Masters
Author: Masters, Timothy; | Call Number: 006.3 Mas p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
TCP/IP : running a successful network/ Washburn K.
Author: Washburn K.; | Call Number: 004.6 Was t | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Maximum linux security: a hacker's guide to protecting your linux server and workstation
Author: Anonymous; | Call Number: 005.43 Ano m | Type: Softcopy Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Certified information security management (CISM Review Manual 2013)
Call Number: 658.478 Cer | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
14
15
16
17
18
19
20
21
22
23
Next