Your search for 42956 returns 6735 document(s) |
Management of information security 2nd ed. |
Author: Whitman, Michael E.; | Call Number: 005.8 Whi m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Shellcoder's handbook: discovering and exploiting security holes 2nd ed. |
Call Number: 005.8 She | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer security basics/editor Deborah Russell and G.T. Gangemi S.R. |
Call Number: 005.8 Com | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network and internetwork security principles and practice |
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Protection and security on the information superhighway |
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Managing risk in information systems |
Author: Gibson, Darril; | Call Number: 005.8 Gib m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Outsourcing information security/ C. Warren Axelrod |
Author: Axelrod C. Warren; | Call Number: 005.8 Axe o | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Corporate computer security 4th ed. |
Author: Boyle, Randall J.; | Call Number: 005.8 Boy c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secrets and Lies: Digital security in a Networked world whith new information about post 9/11 security |
Author: Schneier, I Bruce; | Call Number: 005.8 Sch s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information security and privacy: third Australian conference, ACISP'98/Brisbane, Australia, July 13-15, 1998 proceedings |
Call Number: 005.8 Inf | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|