Search Result
Save to File
Your search for
45028
returns
5060
document(s)
The Shellcoder's handbook: discovering and exploiting security holes 2nd ed.
Call Number: 005.8 She | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Information security architecture: an integrated approach to security in the organization 2nd ed.
Author: Killmeyer, Jan; | Call Number: 005.8 Kil i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
The Basics of information security: understanding the fundamentals of infosec in theory and practice 2nd ed.
Author: Andress, Jason; | Call Number: 005.8 And b | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Management of information security 2nd ed.
Author: Whitman, Michael E.; | Call Number: 005.8 Whi m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Cryptography and Network security principles and practice 2nd ed.
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Corporate computer security 4th ed.
Author: Boyle, Randall J.; | Call Number: 005.8 Boy c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer security principles and practice 3 rd ed.
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer security principles and practice 4 th ed.
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Hacking: the art of exploitation 2nd ed.
Author: Erickson, Jon; | Call Number: 005.8 Eri h | Type: Softcopy Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Hacking: the art of exploitation 2nd ed.
Author: Erickson, Jon; | Call Number: 005.8 Eri h | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev 1
2
3
4
5
6
7
8
9
10
Next