Your search for 37638 returns 5310 document(s) |
Safety high accuracy context-aware matrix (CAM) making based on X.509 proxy certificate, (LNCS-Lecture Notes in Computer Science 5576)Hal 829-837 |
Author: Hoon Ko; Ning Chen; Goreti Marreiros; Carlos Ramos; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
ITI security management/ |
Call Number: 658.403 8 Caz i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
DNS security management |
Author: Dooley, Michael; | Call Number: 005.8 Doo d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer security risk management/ I.C. Palmer; G.A. Potter |
Author: Palmer, I.C.; | Call Number: 005.8 Pal c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Risk management for computer security: protecting your network and information assets |
Author: Jones, Andy; | Call Number: 658.478 Jon r | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer security : art and science |
Author: Bishop, Matt; | Call Number: 005.8 Bis c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Instructional models for course design & development/ Reginald F. Melton |
Author: Melton, Reginald F.; | Call Number: 375.001 Mel i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A First course in computer technology |
Author: Hartley, Michael G.; | Call Number: 621.39 Har f | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer architecture : a first course |
Author: Dowsing, Roy; | Call Number: 004.22 Dow c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security Architecture Design, Development & Operations |
Author: King, Christopher M.; | Call Number: 621.389 28 Kin s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|