Your search for 44072 returns 6356 document(s) |
Introduction to network security theory and practice |
Author: Wang, Jie; | Call Number: 005.8 Wan i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information security risk analysis/Thomas R. |
Author: Poltier, Thomas R.; | Call Number: 005.8 Pel i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network security in the'90s :issues and solutions for managers/Thomas W. Madron |
Author: Madron, Thomas William; | Call Number: 005.8 Mad n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Internet security made easy: a plain english guide to protecting yourself and your company online/Douglas Schwitzer |
Author: Schweitzer, Douglas; | Call Number: 005.8 Sch i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer security principles and practice 3 rd ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer security principles and practice 4 th ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
E-Commerce security strategies: protecting the enterprise |
Author: Cameron, Debra; | Call Number: 658.478 Cam e | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information security architecture: an integrated approach to security in the organization 2nd ed. |
Author: Killmeyer, Jan; | Call Number: 005.8 Kil i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security issues for the internet and the word wide web |
Author: Cameron, Debra; | Call Number: 005.8 Cam s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Firewalls and internet security: repellinghthewily hacker |
Author: Cheswick, William R.; | Call Number: 005.8 Che f | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|