Your search for 4956 returns 1343 document(s) |
Cryptography and computational number theory |
Call Number: 005.8 Cry | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and network security: principles and practice 6th ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied cryptography and network security: first international conf. ACNS 2003 Kunning, China, October 16-19, 2003 Proceedings |
Author: Zhou, Jianying; | Call Number: 005.8 Zho a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and Network security: principles and practice 5th ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Management of information security 3rd ed. |
Author: Whitman, Michael E.; | Call Number: 005.8 Whi m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and Network security: principles and practice 4th ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Linux System Security: An administrator's guide to Open Source Security Tools/ Scott Mann and Ellen L. Mitchell |
Author: Mann, Scott; | Call Number: 005.43 Man l | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Maximum Linux security : [a hacker's guide to protecting your Linux server and workstation]/ Anonymous |
Author: Ray, John; | Call Number: 005.8 Ray m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Implementing the ISO/IEC 27001 ISMS standard 2nd ed. |
Author: Humphreys, Edward; | Call Number: 005.8 Hum i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Physical security for IT/ Michael Erbschloe |
Author: Erbschloe, Michael; | Call Number: 005.8 Erb p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|