Search Result Save to File Save as CSV
Your search for 35815 returns 1865 document(s)
Distributed algorithms and protocols
Author: Raynal, Michel; | Call Number: 004.36 Ray d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Internetworking with TCP/IP 2nd ed.
Author: Comer, Douglas; | Call Number: 004.6 Com i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Internetworking with TCP/IP: principles, protocols, and architecture
Author: Comer, Douglas E.; | Call Number: 004.6 Com i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Routing in the internet/Christian Huitema
Author: Huitema, Christian; | Call Number: 004.62 Hui r | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
TCP/IP with windows NT illustrated
Author: Bisailon, Teresa; | Call Number: 005.713 Bis t | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
A Scalable architecture for classifying network security threats, Hal. 3061-3064
Author: Jian Tang; Dongxia Wang; Liang Ming and Xiang Li; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Information security risk analysis/Thomas R.
Author: Poltier, Thomas R.; | Call Number: 005.8 Pel i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information warfare and security/Dorothy E. Denning
Author: Denning, Dorothy E.R.; | Call Number: 355.343 Den i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information security management: implementation and global standard (ISO-2700)
Author: Jivika Govil; Jivesh Govil; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Security engineering: a guide to building dependable distributed systems
Author: Anderson, Ross; | Call Number: 005.8 And s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   18 19 20 21 22 23 24 25 26 27  Next