Search Result Save to File Save as CSV
Your search for 48634 returns 5047 document(s)
The Shellcoder's handbook: discovering and exploiting security holes 2nd ed.
Call Number: 005.8 She | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The Basics of information security: understanding the fundamentals of infosec in theory and practice 2nd ed.
Author: Andress, Jason; | Call Number: 005.8 And b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Corba security : an introduction to safe computing with obejcts/ Bob Bakley
Author: Blakley, Bob; | Call Number: 005.8 Bla c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security basics/editor Deborah Russell and G.T. Gangemi S.R.
Call Number: 005.8 Com | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Rancangan tata kelola TI dengan kerangka kerja tata kelola teknologi Informasi dan Komunikasi Nasional: Studi Kasus Direktorat Jenderal X
Author: EKO SUWANTO; | Call Number: T-0917 (Softcopy T-0571) | Edition: 2010 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Analisis kemapanan end user information competency dan hubungannya dengan nilai analisis e-readiness organisasi studi kasus : Kementerian Luar Negeri
Author: Linardi Utama; | Call Number: KA-173 (Softcopy KA-172) | Edition: 2011 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Analisis faktor-faktor yang mempengarihi kesuksesan penerapan aplikasi sistem informasi kepegawaian: studi kasus Kementerian luar negeri
Author: Zainudin Syuhada; | Call Number: KA-710 (Softcopy KA-708) MAK KA-369 | Edition: 2015 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Applied cryptography and network security: first international conf. ACNS 2003 Kunning, China, October 16-19, 2003 Proceedings
Author: Zhou, Jianying; | Call Number: 005.8 Zho a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Inside network perimeter security: the definitve guide to firewalls, VPNs, routers, and instruction Detection
Author: Northcutt, Stephen...[et. al.]; | Call Number: 005.8 Ins | Edition: 2003 | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Applied cryptography and network security : first internal conference ACNS 2003, Kunnings, China, October 16-19, 2003, Proceedings
Author: Zhou, Jianjing; | Call Number: 005.8 Zho o | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   9 10 11 12 13 14 15 16 17 18  Next