Search Result Save to File Save as CSV
Your search for 42956 returns 6735 document(s)
Physical security for IT/ Michael Erbschloe
Author: Erbschloe, Michael; | Call Number: 005.8 Erb p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer and communications security: strategies for the 1990
Author: Cooper, James Arlin; | Call Number: 005.8 Coo c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Practical firewalls/Terry William Ogletree
Author: Ogletree, Terry William; | Call Number: 005.8 Ogl p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Professional web services security
Call Number: 005.8 Pro | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Network security in the'90s :issues and solutions for managers/Thomas W. Madron
Author: Madron, Thomas William; | Call Number: 005.8 Mad n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Building internet firewalls
Author: Zwicky, Elizabeth D.; | Call Number: 005.8 Zwi b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Network security: how to plan for it and achive it
Author: Baker, Richard H.; | Call Number: 658.478 Bak n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
CyBOK: Cyber Security Body of Knowledge version 2.1
Author: Rashid, Awais; Danezis, George; Chivers, Howard; Lupu, Emil; Martin, Andrew; | Call Number: 005.8 Ras c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
CyBOK: The Cyber Security Body of Knowledge version 1.0
Call Number: 005.8 Cyb | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan implementasi sistem keamanan jaringan berbasis VPN pada sebuah perusahaan studi kasus: PT DANAREKSA
Author: Riska Adriyani; | Call Number: T-0326 (Softcopy T-0148) | Edition: 2002 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   6 7 8 9 10 11 12 13 14 15  Next