Your search for 43072 returns 720 document(s) |
Pengembangan Automated Security Scanner dan Deployment Sistem Manajemen Pivate Cloud di Lab Security FASILKOM UI (Center for Cyber Security and Cyrptography, Universitas Indonesia) |
Author: Steven Kusuman; | Call Number: KP-3343 | Type: Kerja Praktek (KP)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Verifying Security Protocols with Brutus, page 443-487 |
Author: E. M. Clarke, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Practical unix security/Simson Garfinkel and Gene Spafford |
Author: Garfinkel, Simson; | Call Number: 005.8 Gar p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network security essentials applications and standards 2nd ed. |
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security and Privacy Issues of Handheld and Wearable Wireless Devices |
Author: Roberto Di Pietro, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Using the common criteria for it security evaluation/ Debra S. Hermann |
Author: Hermann, Debra S.; | Call Number: 005.8 Her s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Practical guide to security assessments/ Sudhanshu Kairab |
Author: Kairab, Sudhanshu; | Call Number: 658.478 Kai p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security system-awareness=0, page 45 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Will PKI become a key to online security?, page 13 |
Author: Sixto Ortiz | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Facing the challenge of wireless security, Page 16 |
Author: Sandra Kay Miller | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|