Search Result
Save to File
Your search for
35834
returns
3785
document(s)
Network design security and management, HAL. 309-314
Author: V.B. Waghmare; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Risk management for computer security: protecting your network and information assets
Author: Jones, Andy; | Call Number: 658.478 Jon r | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Corporate computer and network security
Author: Panko, Raymond; | Call Number: 005.8 Pan c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Measured interference of network security mechanisms with network performance
Author: Hans-Werner Braun; Kimberly Claffy; Andrew Gross; | Call Number: SEM-217 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Introduction to network security theory and practice
Author: Wang, Jie; | Call Number: 005.8 Wan i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Network and internetwork security principles and practice
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Network security: how to plan for it and achive it
Author: Baker, Richard H.; | Call Number: 658.478 Bak n | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Design and delivery of undergraduate IT security management course, (LNCS-Lecture Notes in Computer Science 5576) Hal. 402-411
Author: Jemal H. Abawaijy; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
ITI security management/
Call Number: 658.403 8 Caz i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
DNS security management
Author: Dooley, Michael; | Call Number: 005.8 Doo d | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev 1
2
3
4
5
6
7
8
9
10
Next