Your search for 42956 returns 6754 document(s) |
Enterprise security architecture: a business-driven approach |
Author: Sherwood, John; | Call Number: 005.8 She e | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer graphics: principles and practice 2nd ed in C/ James F. Foley |
Call Number: 006.66Com | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network security essentials applications and standards 2nd ed. |
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network security: data and voice communications/Fred Simonds |
Author: Simonds, Fred; | Call Number: 005.8 Sim n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Securing e-busniess applications and communications/ Jonathan S. Held |
Author: Held, Jonathan S.; | Call Number: 658.84 Hel s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Practice of computing using python 2nd ed. (INSTRUCTOR'S MANUAL) |
Author: Punch, W.F.; | Call Number: 005.13 Pun p | Type: Instructor's Manual (Khusus Do
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security monitoring |
Author: Fry, Chris; | Call Number: 005.8 Fry s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
DNS security management |
Author: Dooley, Michael; | Call Number: 005.8 Doo d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied cryptography and network security: first international conf. ACNS 2003 Kunning, China, October 16-19, 2003 Proceedings |
Author: Zhou, Jianying; | Call Number: 005.8 Zho a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Maximum Linux security : [a hacker's guide to protecting your Linux server and workstation]/ Anonymous |
Author: Ray, John; | Call Number: 005.8 Ray m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|