Search Result Save to File Save as CSV
Your search for 43072 returns 712 document(s)
Pengembangan Automated Security Scanner dan Deployment Sistem Manajemen Pivate Cloud di Lab Security FASILKOM UI (Center for Cyber Security and Cyrptography, Universitas Indonesia)
Author: Steven Kusuman; | Call Number: KP-3343 | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Verifying Security Protocols with Brutus, page 443-487
Author: E. M. Clarke, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Practical unix security/Simson Garfinkel and Gene Spafford
Author: Garfinkel, Simson; | Call Number: 005.8 Gar p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Network security essentials applications and standards 2nd ed.
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Security and Privacy Issues of Handheld and Wearable Wireless Devices
Author: Roberto Di Pietro, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Using the common criteria for it security evaluation/ Debra S. Hermann
Author: Hermann, Debra S.; | Call Number: 005.8 Her s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
A Practical guide to security assessments/ Sudhanshu Kairab
Author: Kairab, Sudhanshu; | Call Number: 658.478 Kai p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Security system-awareness=0, page 45
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Will PKI become a key to online security?, page 13
Author: Sixto Ortiz | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Facing the challenge of wireless security, Page 16
Author: Sandra Kay Miller | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   4 5 6 7 8 9 10 11 12 13  Next