Search Result Save to File Save as CSV
Your search for 3553 returns 4774 document(s)
DNS security management
Author: Dooley, Michael; | Call Number: 005.8 Doo d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography and computational number theory
Call Number: 005.8 Cry | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography and network security: principles and practice 6th ed.
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Applied cryptography and network security: first international conf. ACNS 2003 Kunning, China, October 16-19, 2003 Proceedings
Author: Zhou, Jianying; | Call Number: 005.8 Zho a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Introduction to network security theory and practice
Author: Wang, Jie; | Call Number: 005.8 Wan i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Communication protocol engineering
Author: Popovic, Miroslav; | Call Number: 621.382 12 Pop c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Communication protocol specification and verification/Richard Lai
Author: Lai, Richard; | Call Number: 004.36 Lai c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer networks usage: recent experiences/ edited by I. Csaba;
Call Number: 004.6 Com | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer networks and their protocols/ D.W. Davies
Author: Davies, D.W.; | Call Number: 004.6 Dav c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information networks: planning and design
Author: Etheridge, David; | Call Number: 004.6 Eth i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   4 5 6 7 8 9 10 11 12 13  Next