Your search for 35815 returns 1865 document(s) |
Distributed algorithms and protocols |
Author: Raynal, Michel; | Call Number: 004.36 Ray d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Internetworking with TCP/IP 2nd ed. |
Author: Comer, Douglas; | Call Number: 004.6 Com i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Internetworking with TCP/IP: principles, protocols, and architecture |
Author: Comer, Douglas E.; | Call Number: 004.6 Com i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Routing in the internet/Christian Huitema |
Author: Huitema, Christian; | Call Number: 004.62 Hui r | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
TCP/IP with windows NT illustrated |
Author: Bisailon, Teresa; | Call Number: 005.713 Bis t | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Scalable architecture for classifying network security threats, Hal. 3061-3064 |
Author: Jian Tang; Dongxia Wang; Liang Ming and Xiang Li; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information security risk analysis/Thomas R. |
Author: Poltier, Thomas R.; | Call Number: 005.8 Pel i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information warfare and security/Dorothy E. Denning |
Author: Denning, Dorothy E.R.; | Call Number: 355.343 Den i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information security management: implementation and global standard (ISO-2700) |
Author: Jivika Govil; Jivesh Govil; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security engineering: a guide to building dependable distributed systems |
Author: Anderson, Ross; | Call Number: 005.8 And s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|