Your search for 47467 returns 5626 document(s) |
Security Architecture Design, Development & Operations |
Author: King, Christopher M.; | Call Number: 621.389 28 Kin s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Outsourcing information security/ C. Warren Axelrod |
Author: Axelrod C. Warren; | Call Number: 005.8 Axe o | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network and internetwork security principles and practice |
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security in communication networks/ Stelvio Cimato |
Author: Gimato, Stelvio; Galdi, Clemente; Persiano, Giuseppe; | Call Number: 005.8 Sec | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Roadmap to information security: for it and infosec managers |
Author: Whitman, Michael E.; | Call Number: 005.8 Whi r | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Advances in computer security management/Editor Thomas A. Rullo |
Call Number: 658.478 Adv | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
User accounting system of centralized computer networks using RADIUS protocol (hal 457 - 462) |
Author: Heru Nurwarsito, Raden Arief Setyawan, Handoko D Fatikno; | Call Number: SEM - 362 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Tutorial: the security of data in networks/ Donald W. Davies |
Call Number: 005.8 Dav t | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secrets and Lies: Digital security in a Networked world whith new information about post 9/11 security |
Author: Schneier, I Bruce; | Call Number: 005.8 Sch s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Shellcoder's handbook: discovering and exploiting security holes 2nd ed. |
Call Number: 005.8 She | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|