Your search for 46264 returns 7320 document(s) |
Maximum linux security: a hacker's guide to protecting your linux server and workstation |
Author: Anonymous; | Call Number: 005.43 Ano m | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Techniques and applications of digital watermarking and content protection |
Author: Arnold, Michael; | Call Number: 005.8 Arn t | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Digital watermarking and steganography |
Author: Cox, Ingemar J.; | Call Number: 005.8 Cox d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Elliptic curves in cryptography |
Author: Blacke, Ian F.; | Call Number: 005.82 Bla c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer organization: hardware/software 2nd ed./ George W. Gorline |
Author: Gorsline, George W.; | Call Number: 004 Gor c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Java How to Program 2nd ed |
Author: Deitel, H.M.; | Call Number: 005.133 Dei j | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Digital certificates: applied internet security |
Author: Feghhi, Jalal; | Call Number: 005.8 Feg d | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Digital certificates: applied internet security |
Author: Feghhi, Jalal; | Call Number: 005.8 Feg d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
IPSec: the new security standard for the internet, intranets, and virtual private networks/Naganand Doraswarry; Dan Harkins |
Author: Doraswary, Naganand; | Call Number: 005.8 Dor i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Unified modeling language reference manual 2nd ed. |
Author: Rumbaugh, James; | Call Number: 005.3 Rum u | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|