Your search for 5622 returns 325 document(s) |
Cryptography: a primer |
Author: Konheim, Alan G.; | Call Number: 526 Kon c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and Data Security |
Author: Denning, Dorothy E.; | Call Number: 005.8 Den c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied cryptography: protocols, algorithms and source code in C |
Author: Schneier, Bruce; | Call Number: 005.82 Sch a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Foiling the system breakers |
Author: Lobel, Jerome; | Call Number: 005.8 Lob f | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Managing information security: a program for the electronic information age |
Author: Schweitzer, James A.; | Call Number: 658.478 Sch m | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Managing information security: a program for the electronic information age/ James A. Schweitzer |
Author: Schweitzer, James A.; | Call Number: 658.478 Sch m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer security management/ Donn B. Parker |
Author: Parker, Donn B.; | Call Number: 658.478 Par c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer fraud and cuntermeasures/ Leonard I. Krauss |
Author: Krauss, Leonard I.; | Call Number: 364.168 Kra c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Microcomputer primer |
Author: Waite, Mitchell; | Call Number: 004.16 Wai m | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Microcomputer primer |
Author: "Waite, Mitchell"; | Call Number: 004.16 Wai m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|