Your search for 46736 returns 5772 document(s) |
Enterprise security architecture: a business-driven approach |
Author: Sherwood, John; | Call Number: 005.8 She e | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and Network security principles and practice 3rd ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and Network security principles and practice 2nd ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and network security: principles and practice 6th ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and Network security: principles and practice 5th ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and Network security: principles and practice 4th ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Smart card security and applications/Mike Hendry |
Author: Hendry, Mike; | Call Number: 006 Hen s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
CyBOK: Cyber Security Body of Knowledge version 2.1 |
Author: Rashid, Awais; Danezis, George; Chivers, Howard; Lupu, Emil; Martin, Andrew; | Call Number: 005.8 Ras c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
CyBOK: The Cyber Security Body of Knowledge version 1.0 |
Call Number: 005.8 Cyb | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analisis risiko keamanan informasi: studi kasus aplikasi uang elektronik PT XYZ |
Author: Radyan Yudha Bhaskara; | Call Number: KA-1154 (Softcopi KA-1147) MAK KA-800 | Edition: 2019 | Type: Karya Akhir (KA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|