Search Result
Save to File
Your search for
5622
returns
321
document(s)
Computer and information security handbook
Author: Vacca, John R.; | Call Number: 005.8 Vac c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Cryptography and Network security principles and practice 4th ed. (INSTRUCTOR'S MANUAL)
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Instructor's Manual
Find Similar
|
Add To Favorites
|
Detail in New Window
Security risk management building an information security risk management program from the ground up
Call Number: 005.8 Whe s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Security monitoring
Author: Fry, Chris; | Call Number: 005.8 Fry s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Verifikasi protokol otentikasi Horn-Preneel menggunakan A VISPA (Automated Validation of Internet Security Protocols and Applications)
Author: Ilham Kurnia; | Call Number: SK-0618 (Softkopi SK-99) Source Code SK-88 | Type: Skripsi
Find Similar
|
Add To Favorites
|
Detail in New Window
Principles of information security 5th ed.
Author: Whitman, Michael E.; | Call Number: 005.8 Whi p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Management of information security 5th ed.
Author: Whitman, Michael E.; | Call Number: 005.8 Whi m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Readings and cases in the management of information security
Author: Whitman, Michael E.; | Call Number: 005.8 Whi r | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Principles of information security 3rd ed.
Author: Whitman, Michael E.; | Call Number: 005.8 Whi p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Management of information security 2nd ed.
Author: Whitman, Michael E.; | Call Number: 005.8 Whi m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
7
8
9
10
11
12
13
14
15
16
Next