Search Result
Save to File
Your search for
45087
returns
4918
document(s)
Hacking: the art of exploitation 2nd ed.
Author: Erickson, Jon; | Call Number: 005.8 Eri h | Type: Softcopy Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Hacking: the art of exploitation 2nd ed.
Author: Erickson, Jon; | Call Number: 005.8 Eri h | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Managing risk in information systems 2nd ed.
Author: Gibson, Darril; | Call Number: 005.8 Gib m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
The Shellcoder's handbook: discovering and exploiting security holes 2nd ed.
Call Number: 005.8 She | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
The Basics of information security: understanding the fundamentals of infosec in theory and practice 2nd ed.
Author: Andress, Jason; | Call Number: 005.8 And b | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Information security architecture: an integrated approach to security in the organization 2nd ed.
Author: Killmeyer, Jan; | Call Number: 005.8 Kil i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer security : art and science
Author: Bishop, Matt; | Call Number: 005.8 Bis c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
The Art of software testing 2nd ed.
Author: Myers, Glenford J; | Call Number: 005.14 Mye a | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Management of information security 2nd ed.
Author: Whitman, Michael E.; | Call Number: 005.8 Whi m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Building internet firewalls 2nd ed.
Author: Zwicky, Elizabeth D.; | Call Number: 005.8 Zwi b | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev 1
2
3
4
5
6
7
8
9
10
Next