Search Result Save to File Save as CSV
Your search for 37638 returns 5310 document(s)
Safety high accuracy context-aware matrix (CAM) making based on X.509 proxy certificate, (LNCS-Lecture Notes in Computer Science 5576)Hal 829-837
Author: Hoon Ko; Ning Chen; Goreti Marreiros; Carlos Ramos; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
ITI security management/
Call Number: 658.403 8 Caz i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
DNS security management
Author: Dooley, Michael; | Call Number: 005.8 Doo d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security risk management/ I.C. Palmer; G.A. Potter
Author: Palmer, I.C.; | Call Number: 005.8 Pal c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Risk management for computer security: protecting your network and information assets
Author: Jones, Andy; | Call Number: 658.478 Jon r | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security : art and science
Author: Bishop, Matt; | Call Number: 005.8 Bis c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Instructional models for course design & development/ Reginald F. Melton
Author: Melton, Reginald F.; | Call Number: 375.001 Mel i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
A First course in computer technology
Author: Hartley, Michael G.; | Call Number: 621.39 Har f | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Computer architecture : a first course
Author: Dowsing, Roy; | Call Number: 004.22 Dow c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Security Architecture Design, Development & Operations
Author: King, Christopher M.; | Call Number: 621.389 28 Kin s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   7 8 9 10 11 12 13 14 15 16  Next