Your search for 46264 returns 7294 document(s) |
Microsoft windows security resource kit |
Author: Smith, Ben; | Call Number: 005.8 Smi m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Internet firewalls and network security/R. Christopher E. Hare ...[et.al] |
Author: Siyan, Karanjit; Hare, R. Christhoper E.; | Call Number: 005.8 Siy i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer architecture and organization 2nd ed. |
Author: Hayes, John P.; | Call Number: 004.22 Hay c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Art of software testing 2nd ed. |
Author: Myers, Glenford J; | Call Number: 005.14 Mye a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Using the common criteria for it security evaluation/ Debra S. Hermann |
Author: Hermann, Debra S.; | Call Number: 005.8 Her s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Computer incident response planning handbook: Executable plans for protecting information at risk |
Author: McCarthy, N.K.; | Call Number: 005.8 Mcc c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
APL an interactive approach 2nd ed. |
Author: Gilman, Leonard; | Call Number: 005.133 Gil d | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
PL/ I structured programming 2nd ed. |
Author: Hughes, Joan K.; | Call Number: 005.133 Hug p | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Pascal a considerate approach 2nd ed. |
Author: Price, David; | Call Number: 005.133 Pri p | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Essential system administration 2nd ed. |
Author: Frisch, Aeleen; | Call Number: 005.43 Fri e | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|