Search Result Save to File Save as CSV
Your search for 4970 returns 4886 document(s)
Principles of information security 4th ed.
Author: Whitman, Michael E.; | Call Number: 005.8 Whi p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Management of information security 3rd ed.
Author: Whitman, Michael E.; | Call Number: 005.8 Whi m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Building internet firewalls 2nd ed.
Author: Zwicky, Elizabeth D.; | Call Number: 005.8 Zwi b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Building internet firewalls
Author: Zwicky, Elizabeth D.; | Call Number: 005.8 Zwi b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Network security: how to plan for it and achive it
Author: Baker, Richard H.; | Call Number: 658.478 Bak n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
E-Commerce security strategies: protecting the enterprise
Author: Cameron, Debra; | Call Number: 658.478 Cam e | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Advances in information security and assurance: third international conference and workshops, ISA 2009 Seoul, Korea, June 2009 Proceedings
Call Number: 005.8 Adv | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Network and internet work security: principles and practice
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Building secure and reliable network applicatins/Kenneth P. Birman
Author: Birman, Kenneth P.; | Call Number: 004.36 Bir b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Internet firewalls and network security/R. Christopher E. Hare ...[et.al]
Author: Siyan, Karanjit; Hare, R. Christhoper E.; | Call Number: 005.8 Siy i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next