Search Result Save to File Save as CSV
Your search for 40314 returns 3287 document(s)
Smart card security and applications/Mike Hendry
Author: Hendry, Mike; | Call Number: 006 Hen s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
CyBOK: Cyber Security Body of Knowledge version 2.1
Author: Rashid, Awais; Danezis, George; Chivers, Howard; Lupu, Emil; Martin, Andrew; | Call Number: 005.8 Ras c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
CyBOK: The Cyber Security Body of Knowledge version 1.0
Call Number: 005.8 Cyb | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Firewalls and internet security: repellinghthewily hacker
Author: Cheswick, William R.; | Call Number: 005.8 Che f | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information security risk analysis/Thomas R.
Author: Poltier, Thomas R.; | Call Number: 005.8 Pel i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
National security versus data privacy and security: study of personal data privacy and security in Iran, HAL. 1081-1087
Author: Hassan Allpour and Ebrahim Kiani Harchegant; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Abstract machines and grammars/ Water J. Savitch
Author: Savitch, Walter J.; | Call Number: 005.133 Sav a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The field guide to water wells and borehold
Author: Clark, Lewis; | Call Number: 628.114 Cla f | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The Shellcoder's handbook: discovering and exploiting security holes 2nd ed.
Call Number: 005.8 She | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Corba security : an introduction to safe computing with obejcts/ Bob Bakley
Author: Blakley, Bob; | Call Number: 005.8 Bla c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   11 12 13 14 15 16 17 18 19 20  Next