Your search for 46736 returns 5645 document(s) |
Perancangan stanadar arsitektur untuk implementasi PIN pada transaksi kartu kredit di mesin EDC: studi kasus PT Bank ABC Tbk |
Author: Dyar Prily Izzati Ramadhana; | Call Number: KA-721 (Softcopy KA-719) MAK KA-380 | Edition: 2015 | Type: Karya Akhir (KA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Verifikasi protokol otentikasi Horn-Preneel menggunakan A VISPA (Automated Validation of Internet Security Protocols and Applications) |
Author: Ilham Kurnia; | Call Number: SK-0618 (Softkopi SK-99) Source Code SK-88 | Type: Skripsi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied cryptography and network security: first international conf. ACNS 2003 Kunning, China, October 16-19, 2003 Proceedings |
Author: Zhou, Jianying; | Call Number: 005.8 Zho a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Maximum Linux security : [a hacker's guide to protecting your Linux server and workstation]/ Anonymous |
Author: Ray, John; | Call Number: 005.8 Ray m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Inside network perimeter security: the definitve guide to firewalls, VPNs, routers, and instruction Detection |
Author: Northcutt, Stephen...[et. al.]; | Call Number: 005.8 Ins | Edition: 2003 | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied cryptography and network security : first internal conference ACNS 2003, Kunnings, China, October 16-19, 2003, Proceedings |
Author: Zhou, Jianjing; | Call Number: 005.8 Zho o | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Perancangan implementasi sistem keamanan jaringan berbasis VPN pada sebuah perusahaan studi kasus: PT DANAREKSA |
Author: Riska Adriyani; | Call Number: T-0326 (Softcopy T-0148) | Edition: 2002 | Type: Tesis
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Maximum linux security: a hacker's guide to protecting your linux server and workstation |
Author: Anonymous; | Call Number: 005.43 Ano m | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Microsoft windows security inside out for windows XP and windows 2000 |
Author: Bott, Ed; | Call Number: 005.8 Bot m | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Certified information security management (CISM Review Manual 2013) |
Call Number: 658.478 Cer | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|