Search Result
Save to File
Your search for
38620
returns
3925
document(s)
Computer security handbook/editor Arthur, E. Hutt Seymour
Call Number: R.658.478 02 Com | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Verifikasi protokol otentikasi Horn-Preneel menggunakan A VISPA (Automated Validation of Internet Security Protocols and Applications)
Author: Ilham Kurnia; | Call Number: SK-0618 (Softkopi SK-99) Source Code SK-88 | Type: Skripsi
Find Similar
|
Add To Favorites
|
Detail in New Window
Analisis dan pengembangan sistem tata kelola perangkat OMS (Operational Monitoring Security)
Author: Via Setya Hanggatra; | Call Number: KP-2322 (Softcopy KP-1884) | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Konfigurasi network monitoring & security system PT Telekomunikasi Indonesia, Tbk.
Author: A. Fakhrul Arrozi; | Call Number: KP-1135 (Softkopi KP-698) | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Protection and security on the information superhighway
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Designing security architecture solution
Author: Ramachandran, Jay; | Call Number: 005.8 Ram d | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer security : art and science
Author: Bishop, Matt; | Call Number: 005.8 Bis c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Corporate computer and network security
Author: Panko, Raymond; | Call Number: 005.8 Pan c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Physical security for IT/ Michael Erbschloe
Author: Erbschloe, Michael; | Call Number: 005.8 Erb p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Building internet firewalls 2nd ed.
Author: Zwicky, Elizabeth D.; | Call Number: 005.8 Zwi b | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
3
4
5
6
7
8
9
10
11
12
Next