Your search for 46264 returns 7294 document(s) |
Enterprise security architecture: a business-driven approach |
Author: Sherwood, John; | Call Number: 005.8 She e | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Automation production systems, and computer integrated manufacturing 2nd ed./Mikell P. Groover |
Author: Groover, Mikell P.; | Call Number: 670.285 Gro a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Embedded Systems Building Block 2nd ed. : Complete and Ready - to - Use Modules in C |
Author: Labrosse, Jean J.; | Call Number: 004.2 Lab e | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Data communications & teleprocessing systems 2nd ed/ Trevor Housley |
Author: Housley, Trevor; | Call Number: 384.3 Hou d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
TCP/IP lean: web servers for embedded systems 2nd ed. |
Author: Bentham, Jeremy; | Call Number: 004.62 Ben t | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network security: data and voice communications/Fred Simonds |
Author: Simonds, Fred; | Call Number: 005.8 Sim n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network and internet work security: principles and practice |
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Securing e-busniess applications and communications/ Jonathan S. Held |
Author: Held, Jonathan S.; | Call Number: 658.84 Hel s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information processing systems 2nd ed. |
Author: Davis, William S.; | Call Number: 004 Dav i | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Principles and practice of information secuirty: protecting computers from Hackers and lawyers/ Linda Volonino |
Author: Volonino, Linda; | Call Number: 005.8 Vol p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|