Search Result Save to File Save as CSV
Your search for 35815 returns 1830 document(s)
Security protocols: 5th international workshop Paris, France, April, 7-9, 1997 Proceeding/Bruce Christianson
Author: Christianson, Bruce; | Call Number: 004.62 Chr s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Security Architecture Design, Development & Operations
Author: King, Christopher M.; | Call Number: 621.389 28 Kin s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Corporate computer security 4th ed.
Author: Boyle, Randall J.; | Call Number: 005.8 Boy c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Outsourcing information security/ C. Warren Axelrod
Author: Axelrod C. Warren; | Call Number: 005.8 Axe o | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Network and internetwork security principles and practice
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Roadmap to information security: for it and infosec managers
Author: Whitman, Michael E.; | Call Number: 005.8 Whi r | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
A Survey of security issues in opportunistic network, Hal. 3092-3096
Author: Xu Xiang; | Call Number: Sem-302 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Data communications and networks
Author: Godbok, Achyat S.; | Call Number: 004.6 God d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Jaringan neural networks
Author: Kusumoputro, Benjamin; | Call Number: 006.3 Kus j | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Neural networks in computer intelligence
Author: Fu, Limin; | Call Number: 006.3 Fu n | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   7 8 9 10 11 12 13 14 15 16  Next