Search Result Save to File Save as CSV
Your search for 38620 returns 3935 document(s)
Computer and communications security: strategies for the 1990
Author: Cooper, James Arlin; | Call Number: 005.8 Coo c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information security management : Concepts and Practice
Author: Raggad, Bel G.; | Call Number: 005.8 Rag i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Securing e-busniess applications and communications/ Jonathan S. Held
Author: Held, Jonathan S.; | Call Number: 658.84 Hel s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Enterprise security architecture: a business-driven approach
Author: Sherwood, John; | Call Number: 005.8 She e | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Applied cryptography: protocols, algorithms and source code in C
Author: Schneier, Bruce; | Call Number: 005.82 Sch a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security principles and practice 3 rd ed.
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security principles and practice 4 th ed.
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Tutorial: the security of data in networks/ Donald W. Davies
Call Number: 005.8 Dav t | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Practical unix & internet security/O'reilly & Associates, Inc
Author: Garfinkel, Simson; | Call Number: 005.8 Gar p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Unix system security: a guide for users and systems administratiors
Author: Curry, David A.; | Call Number: 005.43 Cur u | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   5 6 7 8 9 10 11 12 13 14  Next