Search Result Save to File Save as CSV
Your search for 36807 returns 7395 document(s)
CWSP: Certified Wireless Security Profesional official study guide
Call Number: 005.807 6 Cws | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Applied cryptography: protocols, algorithms, and sources code in C
Author: Schmeier, Bruce; | Call Number: 005.82 Sch a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information security and privacy: third Australian conference, ACISP'98/Brisbane, Australia, July 13-15, 1998 proceedings
Call Number: 005.8 Inf | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Physical security for IT/ Michael Erbschloe
Author: Erbschloe, Michael; | Call Number: 005.8 Erb p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Using set for science electronic commerce/Grady N. Drew
Author: Drew, Grady W.; | Call Number: 005.8 Dre u | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Network design security and management, HAL. 309-314
Author: V.B. Waghmare; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security management/ Donn B. Parker
Author: Parker, Donn B.; | Call Number: 658.478 Par c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Incremental Data Systems: Databases from the Ground Up (408-412)
Author: Stanley B. Zdonik; | Call Number: SEM-245 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Corporate computer security 4th ed.
Author: Boyle, Randall J.; | Call Number: 005.8 Boy c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Network and internetwork security principles and practice
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   8 9 10 11 12 13 14 15 16 17  Next