Search Result
Save to File
Your search for
46627
returns
5307
document(s)
Securing e-busniess applications and communications/ Jonathan S. Held
Author: Held, Jonathan S.; | Call Number: 658.84 Hel s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Applied cryptography: protocols, algorithms and source code in C
Author: Schneier, Bruce; | Call Number: 005.82 Sch a | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Electronic commerce relationships: trust by design/Peter Keen
Call Number: 005.8 Ele | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
ITI security management/
Call Number: 658.403 8 Caz i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Building secure and reliable network applicatins/Kenneth P. Birman
Author: Birman, Kenneth P.; | Call Number: 004.36 Bir b | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Protection and security on the information superhighway
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Designing security architecture solution
Author: Ramachandran, Jay; | Call Number: 005.8 Ram d | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer security : art and science
Author: Bishop, Matt; | Call Number: 005.8 Bis c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Corporate computer and network security
Author: Panko, Raymond; | Call Number: 005.8 Pan c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
CWSP: Certified Wireless Security Profesional official study guide
Call Number: 005.807 6 Cws | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
4
5
6
7
8
9
10
11
12
13
Next