Your search for 46177 returns 6463 document(s) |
Secrets and Lies: Digital security in a Networked world whith new information about post 9/11 security |
Author: Schneier, I Bruce; | Call Number: 005.8 Sch s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network security: private communication in a public world/Charlie Kaufmann ...[et.al] |
Author: Kaufman, Charlie; | Call Number: 005.8 Kau n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and Network security principles and practice 3rd ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and Network security principles and practice 2nd ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and network security: principles and practice 6th ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and Network security: principles and practice 5th ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer network security: theory and practice/ Jie Wang |
Author: Wang Jie; | Call Number: 005.8 Wan c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information security and privacy: third Australian conference, ACISP'98/Brisbane, Australia, July 13-15, 1998 proceedings |
Call Number: 005.8 Inf | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Hacking: the art of exploitation 2nd ed. |
Author: Erickson, Jon; | Call Number: 005.8 Eri h | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Hacking: the art of exploitation 2nd ed. |
Author: Erickson, Jon; | Call Number: 005.8 Eri h | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|