Search Result
Save to File
Your search for
6809
returns
5900
document(s)
Hacking: the art of exploitation 2nd ed.
Author: Erickson, Jon; | Call Number: 005.8 Eri h | Type: Softcopy Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Managing risk in information systems
Author: Gibson, Darril; | Call Number: 005.8 Gib m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Managing risk in information systems 2nd ed.
Author: Gibson, Darril; | Call Number: 005.8 Gib m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Hacking: the art of exploitation 2nd ed.
Author: Erickson, Jon; | Call Number: 005.8 Eri h | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
ISO 27001 complete self-assessment guide: practical tools for self-assessment
Call Number: 005.8 Iso | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Information security management handbook 5th ed/ Harold Tipton F.
Call Number: 658.055 8 Inf | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Smart card for Room Security System Using Single Board Computer Friendly ARM Mini 2440
Author: Enas Dhuhri Kusuma, Widyawan, Wahyu Prasetya; | Call Number: SEM-367 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer network architectures/ Anton Meijer
Author: Meijer, Anton; | Call Number: 004.16 Mei c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Corba security : an introduction to safe computing with obejcts/ Bob Bakley
Author: Blakley, Bob; | Call Number: 005.8 Bla c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Perancangan Kapabilitas Security Operations Center (SOC): Studi Kasus PT XYZ
Author: Muhammad Firzi Nabil; | Call Number: KA-1732 (Softcopy KA-1723) MAK KA-1369 | Edition: 2023 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
7
8
9
10
11
12
13
14
15
16
Next