Your search for 35815 returns 1830 document(s) |
Security protocols: 5th international workshop Paris, France, April, 7-9, 1997 Proceeding/Bruce Christianson |
Author: Christianson, Bruce; | Call Number: 004.62 Chr s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security Architecture Design, Development & Operations |
Author: King, Christopher M.; | Call Number: 621.389 28 Kin s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Corporate computer security 4th ed. |
Author: Boyle, Randall J.; | Call Number: 005.8 Boy c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Outsourcing information security/ C. Warren Axelrod |
Author: Axelrod C. Warren; | Call Number: 005.8 Axe o | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network and internetwork security principles and practice |
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Roadmap to information security: for it and infosec managers |
Author: Whitman, Michael E.; | Call Number: 005.8 Whi r | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Survey of security issues in opportunistic network, Hal. 3092-3096 |
Author: Xu Xiang; | Call Number: Sem-302 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Data communications and networks |
Author: Godbok, Achyat S.; | Call Number: 004.6 God d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Jaringan neural networks |
Author: Kusumoputro, Benjamin; | Call Number: 006.3 Kus j | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Neural networks in computer intelligence |
Author: Fu, Limin; | Call Number: 006.3 Fu n | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|