Search Result Save to File Save as CSV
Your search for 4957 returns 5312 document(s)
Hacking: the art of exploitation 2nd ed.
Author: Erickson, Jon; | Call Number: 005.8 Eri h | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The Shellcoder's handbook: discovering and exploiting security holes 2nd ed.
Call Number: 005.8 She | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Managing risk in information systems
Author: Gibson, Darril; | Call Number: 005.8 Gib m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Managing risk in information systems 2nd ed.
Author: Gibson, Darril; | Call Number: 005.8 Gib m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Designing security architecture solution
Author: Ramachandran, Jay; | Call Number: 005.8 Ram d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Hacking: the art of exploitation 2nd ed.
Author: Erickson, Jon; | Call Number: 005.8 Eri h | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The Basics of information security: understanding the fundamentals of infosec in theory and practice 2nd ed.
Author: Andress, Jason; | Call Number: 005.8 And b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
ISO 27001 complete self-assessment guide: practical tools for self-assessment
Call Number: 005.8 Iso | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Secrets and Lies: Digital security in a Networked world whith new information about post 9/11 security
Author: Schneier, I Bruce; | Call Number: 005.8 Sch s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information security architecture: an integrated approach to security in the organization 2nd ed.
Author: Killmeyer, Jan; | Call Number: 005.8 Kil i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   5 6 7 8 9 10 11 12 13 14  Next