Your search for 48634 returns 5047 document(s) |
The Shellcoder's handbook: discovering and exploiting security holes 2nd ed. |
Call Number: 005.8 She | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Basics of information security: understanding the fundamentals of infosec in theory and practice 2nd ed. |
Author: Andress, Jason; | Call Number: 005.8 And b | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Corba security : an introduction to safe computing with obejcts/ Bob Bakley |
Author: Blakley, Bob; | Call Number: 005.8 Bla c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer security basics/editor Deborah Russell and G.T. Gangemi S.R. |
Call Number: 005.8 Com | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Rancangan tata kelola TI dengan kerangka kerja tata kelola teknologi Informasi dan Komunikasi Nasional: Studi Kasus Direktorat Jenderal X |
Author: EKO SUWANTO; | Call Number: T-0917 (Softcopy T-0571) | Edition: 2010 | Type: Tesis
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analisis kemapanan end user information competency dan hubungannya dengan nilai analisis e-readiness organisasi studi kasus : Kementerian Luar Negeri |
Author: Linardi Utama; | Call Number: KA-173 (Softcopy KA-172) | Edition: 2011 | Type: Karya Akhir (KA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analisis faktor-faktor yang mempengarihi kesuksesan penerapan aplikasi sistem informasi kepegawaian: studi kasus Kementerian luar negeri |
Author: Zainudin Syuhada; | Call Number: KA-710 (Softcopy KA-708) MAK KA-369 | Edition: 2015 | Type: Karya Akhir (KA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied cryptography and network security: first international conf. ACNS 2003 Kunning, China, October 16-19, 2003 Proceedings |
Author: Zhou, Jianying; | Call Number: 005.8 Zho a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Inside network perimeter security: the definitve guide to firewalls, VPNs, routers, and instruction Detection |
Author: Northcutt, Stephen...[et. al.]; | Call Number: 005.8 Ins | Edition: 2003 | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied cryptography and network security : first internal conference ACNS 2003, Kunnings, China, October 16-19, 2003, Proceedings |
Author: Zhou, Jianjing; | Call Number: 005.8 Zho o | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|