Search Result
Save to File
Your search for
35669
returns
2486
document(s)
Managing information security: a program for the electronic information age
Author: Schweitzer, James A.; | Call Number: 658.478 Sch m | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Cryptography and network security: principles and practice 3rd ed.
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Unix system security a guide for users and systems administrators
Author: Curry, David A.; | Call Number: 005.43 Cur u | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Towards risk-oriented security ontology, HAL. 170 - 174
Author: Basuki Rahmad, Suhono H. Supangkat; Jaka Sembiring; Kridanto Surendro; | Call Number: SEM-294 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Survey of vulnerability and security of mobile ad hoc networks
Author: Siddharth S Rautaray and Sanjeev Sharma; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Built-in security feature of sensor network, HAL. 440 - 447
Author: Kalpana Sharma; Vikash Varum; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Information security management: implementation and global standard (ISO-2700)
Author: Jivika Govil; Jivesh Govil; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Enforcing security in .net based web services, HAL. 996-1001
Author: E. George Dharma Prakash Raj; N. Ssikuladevi; | Call Number: SEM-289 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Solaris SunShield basic security modula guide
Call Number: 005.43 Sol | Type: Buku Manual
Find Similar
|
Add To Favorites
|
Detail in New Window
A Scalable architecture for classifying network security threats, Hal. 3061-3064
Author: Jian Tang; Dongxia Wang; Liang Ming and Xiang Li; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
17
18
19
20
21
22
23
24
25
26
Next