Your search for 6809 returns 5923 document(s) |
Perancangan security operation center (SOC): studi kasus PT XYZ |
Author: Kristiadi Himawan; | Call Number: KA-1069 (Softcopy KA-1065) MAK KA-714 | Edition: 2018 | Type: Karya Akhir (KA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer fraud and cuntermeasures/ Leonard I. Krauss |
Author: Krauss, Leonard I.; | Call Number: 364.168 Kra c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The cydades computer network/ edited by L. Pouzen |
Author: Fouzin, L.; | Call Number: 004.6 | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied cryptography: protocols, algorithms and source code in C |
Author: Schneier, Bruce; | Call Number: 005.82 Sch a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Inside Internet Security: What hackers don't want you to know.../Jeff Crume |
Author: Crume, Jeff; | Call Number: 005.8 Cru i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Lotus notes and domino 4.5 architecture, adminstration, and security/Scott L. Thomas < Bradley |
Author: Thomas, Scott L.; | Call Number: 005.369 Tho l | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information security an integrated collection of essaysl |
Call Number: 005.8 Inf | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Iformation systems security |
Author: Fisher, Royal P.; | Call Number: 658.478 Fis | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Smart card security and applications/Mike Hendry |
Author: Hendry, Mike; | Call Number: 006 Hen s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Securing e-busniess applications and communications/ Jonathan S. Held |
Author: Held, Jonathan S.; | Call Number: 658.84 Hel s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|