Your search for 43721 returns 2368 document(s) |
Computer security risk management/ I.C. Palmer; G.A. Potter |
Author: Palmer, I.C.; | Call Number: 005.8 Pal c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Trojans, Worms, and spyware: a computer security professional's guide to malicious code |
Author: Erbschloe, Michael; | Call Number: 005.84 Erb t | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Risk management for computer security: protecting your network and information assets |
Author: Jones, Andy; | Call Number: 658.478 Jon r | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer security risk analysis and control a guide for the dp manager |
Author: Wong, KK; | Call Number: 658.47 Won r | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer network security: second internaitonal workshop on mathematical methods, models and architectures for computer network security MMM-ACNS 2003 St Petersburg, Russia, Sept' 2003, Proceeding |
Call Number: 005.8 Com | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography: a new dimension in computer data security: a guide for the design and implementation of secure systems |
Author: Meyer, Carl H.; | Call Number: 652.8 Mey c | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Studi model organisasi CSITs (Computer Security Incident Response TEAMS) pada perusahaan berskala besar, HAL. C.61-C.65 |
Author: Riza Kurniawan, Budi Rahardjo; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Design and delivery of undergraduate IT security management course, (LNCS-Lecture Notes in Computer Science 5576) Hal. 402-411 |
Author: Jemal H. Abawaijy; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Protecting global SOA and other security threats, (LNCS-Lecture Notes in Computer Science 5576) Hal 652-661 |
Author: Deven Shah; Ashish Mangal; Mayank Argawal; Mahendra Mehra; Tushar Dave; Dhiren Patel; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A mathematical approach towards trust based security in pervasive computing environment, (LNCS-Lecture Notes in Computer Science 5576) Hal 702-711 |
Author: Naima Iltaf; Mukhtar Hussain; Farrukh Kamran; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|