Your search for 38620 returns 3935 document(s) |
Computer and communications security: strategies for the 1990 |
Author: Cooper, James Arlin; | Call Number: 005.8 Coo c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information security management : Concepts and Practice |
Author: Raggad, Bel G.; | Call Number: 005.8 Rag i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Securing e-busniess applications and communications/ Jonathan S. Held |
Author: Held, Jonathan S.; | Call Number: 658.84 Hel s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Enterprise security architecture: a business-driven approach |
Author: Sherwood, John; | Call Number: 005.8 She e | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied cryptography: protocols, algorithms and source code in C |
Author: Schneier, Bruce; | Call Number: 005.82 Sch a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer security principles and practice 3 rd ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer security principles and practice 4 th ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Tutorial: the security of data in networks/ Donald W. Davies |
Call Number: 005.8 Dav t | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Practical unix & internet security/O'reilly & Associates, Inc |
Author: Garfinkel, Simson; | Call Number: 005.8 Gar p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Unix system security: a guide for users and systems administratiors |
Author: Curry, David A.; | Call Number: 005.43 Cur u | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|