Search Result Save to File Save as CSV
Your search for 42956 returns 6754 document(s)
Enterprise security architecture: a business-driven approach
Author: Sherwood, John; | Call Number: 005.8 She e | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer graphics: principles and practice 2nd ed in C/ James F. Foley
Call Number: 006.66Com | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Network security essentials applications and standards 2nd ed.
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Network security: data and voice communications/Fred Simonds
Author: Simonds, Fred; | Call Number: 005.8 Sim n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Securing e-busniess applications and communications/ Jonathan S. Held
Author: Held, Jonathan S.; | Call Number: 658.84 Hel s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The Practice of computing using python 2nd ed. (INSTRUCTOR'S MANUAL)
Author: Punch, W.F.; | Call Number: 005.13 Pun p | Type: Instructor's Manual (Khusus Do
Find Similar |  Add To Favorites |  Detail in New Window 
Security monitoring
Author: Fry, Chris; | Call Number: 005.8 Fry s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
DNS security management
Author: Dooley, Michael; | Call Number: 005.8 Doo d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Applied cryptography and network security: first international conf. ACNS 2003 Kunning, China, October 16-19, 2003 Proceedings
Author: Zhou, Jianying; | Call Number: 005.8 Zho a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Maximum Linux security : [a hacker's guide to protecting your Linux server and workstation]/ Anonymous
Author: Ray, John; | Call Number: 005.8 Ray m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   5 6 7 8 9 10 11 12 13 14  Next