Your search for 46627 returns 5307 document(s) |
Applied cryptography: protocols, algorithms, and sources code in C |
Author: Schmeier, Bruce; | Call Number: 005.82 Sch a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Physical security for IT/ Michael Erbschloe |
Author: Erbschloe, Michael; | Call Number: 005.8 Erb p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Using set for science electronic commerce/Grady N. Drew |
Author: Drew, Grady W.; | Call Number: 005.8 Dre u | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network design security and management, HAL. 309-314 |
Author: V.B. Waghmare; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer security management/ Donn B. Parker |
Author: Parker, Donn B.; | Call Number: 658.478 Par c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information security architecture: an integrated approach to security in the organization 2nd ed. |
Author: Killmeyer, Jan; | Call Number: 005.8 Kil i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Corporate computer security 4th ed. |
Author: Boyle, Randall J.; | Call Number: 005.8 Boy c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Outsourcing information security/ C. Warren Axelrod |
Author: Axelrod C. Warren; | Call Number: 005.8 Axe o | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network and internetwork security principles and practice |
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Roadmap to information security: for it and infosec managers |
Author: Whitman, Michael E.; | Call Number: 005.8 Whi r | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|