Search Result Save to File Save as CSV
Your search for 46264 returns 7294 document(s)
Microsoft windows security resource kit
Author: Smith, Ben; | Call Number: 005.8 Smi m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Internet firewalls and network security/R. Christopher E. Hare ...[et.al]
Author: Siyan, Karanjit; Hare, R. Christhoper E.; | Call Number: 005.8 Siy i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer architecture and organization 2nd ed.
Author: Hayes, John P.; | Call Number: 004.22 Hay c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The Art of software testing 2nd ed.
Author: Myers, Glenford J; | Call Number: 005.14 Mye a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Using the common criteria for it security evaluation/ Debra S. Hermann
Author: Hermann, Debra S.; | Call Number: 005.8 Her s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The Computer incident response planning handbook: Executable plans for protecting information at risk
Author: McCarthy, N.K.; | Call Number: 005.8 Mcc c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
APL an interactive approach 2nd ed.
Author: Gilman, Leonard; | Call Number: 005.133 Gil d | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
PL/ I structured programming 2nd ed.
Author: Hughes, Joan K.; | Call Number: 005.133 Hug p | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Pascal a considerate approach 2nd ed.
Author: Price, David; | Call Number: 005.133 Pri p | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Essential system administration 2nd ed.
Author: Frisch, Aeleen; | Call Number: 005.43 Fri e | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   16 17 18 19 20 21 22 23 24 25  Next