Search Result
Save to File
Your search for
45109
returns
3952
document(s)
Using the common criteria for it security evaluation/ Debra S. Hermann
Author: Hermann, Debra S.; | Call Number: 005.8 Her s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
IT manager's guide to virtual private networks/David Clark
Author: Clark, David Leon; | Call Number: 005.8 Cla i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Internet Besieged: Countering Cyberspace Scofflans/Dorothy Denning and Peter J. Denning
Author: Denning Dorothy E.; | Call Number: 364.168 Int | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
A Practical guide to security assessments/ Sudhanshu Kairab
Author: Kairab, Sudhanshu; | Call Number: 658.478 Kai p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Building linux and open BSD firewalls/Wes Sonnenreich; Tom Yates
Author: Sonnenreich, Wes; | Call Number: 005.8 Son b | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Maximum linux security: a hacker's guide to protecting your linux server and workstation
Author: Anonymous; | Call Number: 005.43 Ano m | Type: Softcopy Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Certified information security management (CISM Review Manual 2013)
Call Number: 658.478 Cer | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Certified information security management (Cism Review Manual 2015)
Call Number: 658.478 Cer | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Techniques and applications of digital watermarking and content protection
Author: Arnold, Michael; | Call Number: 005.8 Arn t | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Security engineering: a guide to building dependable distributed systems
Author: Anderson, Ross; | Call Number: 005.8 And s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
9
10
11
12
13
14
15
16
17
18
Next