Search Result
Save to File
Your search for
4956
returns
1343
document(s)
Perancangan kebijakan keamanan yang efectif dalam menghadapi ancaman internal studi kasus President University
Author: Sasongko Budhi W.; | Call Number: PA-0073 (Softcopy PA-073) | Edition: 2005 | Type: Proyek Akhir (PA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer network security: theory and practice/ Jie Wang
Author: Wang Jie; | Call Number: 005.8 Wan c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Application software recovery CD ROM
Call Number: 004.145 Hpb | Type: Software Program
Find Similar
|
Add To Favorites
|
Detail in New Window
Enterprise security architecture: a business-driven approach
Author: Sherwood, John; | Call Number: 005.8 She e | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer and information security handbook
Author: Vacca, John R.; | Call Number: 005.8 Vac c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Cryptography and Network security principles and practice 4th ed. (INSTRUCTOR'S MANUAL)
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Instructor's Manual
Find Similar
|
Add To Favorites
|
Detail in New Window
Security risk management building an information security risk management program from the ground up
Call Number: 005.8 Whe s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Security monitoring
Author: Fry, Chris; | Call Number: 005.8 Fry s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Verifikasi protokol otentikasi Horn-Preneel menggunakan A VISPA (Automated Validation of Internet Security Protocols and Applications)
Author: Ilham Kurnia; | Call Number: SK-0618 (Softkopi SK-99) Source Code SK-88 | Type: Skripsi
Find Similar
|
Add To Favorites
|
Detail in New Window
Principles of information security 5th ed.
Author: Whitman, Michael E.; | Call Number: 005.8 Whi p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
6
7
8
9
10
11
12
13
14
15
Next