Your search for 40314 returns 3287 document(s) |
Smart card security and applications/Mike Hendry |
Author: Hendry, Mike; | Call Number: 006 Hen s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
CyBOK: Cyber Security Body of Knowledge version 2.1 |
Author: Rashid, Awais; Danezis, George; Chivers, Howard; Lupu, Emil; Martin, Andrew; | Call Number: 005.8 Ras c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
CyBOK: The Cyber Security Body of Knowledge version 1.0 |
Call Number: 005.8 Cyb | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Firewalls and internet security: repellinghthewily hacker |
Author: Cheswick, William R.; | Call Number: 005.8 Che f | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information security risk analysis/Thomas R. |
Author: Poltier, Thomas R.; | Call Number: 005.8 Pel i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
National security versus data privacy and security: study of personal data privacy and security in Iran, HAL. 1081-1087 |
Author: Hassan Allpour and Ebrahim Kiani Harchegant; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Abstract machines and grammars/ Water J. Savitch |
Author: Savitch, Walter J.; | Call Number: 005.133 Sav a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The field guide to water wells and borehold |
Author: Clark, Lewis; | Call Number: 628.114 Cla f | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Shellcoder's handbook: discovering and exploiting security holes 2nd ed. |
Call Number: 005.8 She | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Corba security : an introduction to safe computing with obejcts/ Bob Bakley |
Author: Blakley, Bob; | Call Number: 005.8 Bla c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|