Search Result Save to File Save as CSV
Your search for 6845 returns 6618 document(s)
Computer network: a system approach
Author: Peterson, Larry L.; | Call Number: 004.65 Pet c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Trojans, Worms, and spyware: a computer security professional's guide to malicious code
Author: Erbschloe, Michael; | Call Number: 005.84 Erb t | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Security engineering: a guide to building dependable distributed systems
Author: Anderson, Ross; | Call Number: 005.8 And s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Maximum linux security: a hacker's guide to protecting your linux server and workstation
Author: Anonymous; | Call Number: 005.43 Ano m | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Certified information security management (CISM Review Manual 2013)
Call Number: 658.478 Cer | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Certified information security management (Cism Review Manual 2015)
Call Number: 658.478 Cer | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Assessing and managing security risk in it systems: a structured methodology/ John Mccumber
Author: Mccumber, John; | Call Number: 005.8 Mcc a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Certified information security management (CISM Review Manual 2011)
Call Number: 658.478 Cer | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Advances in computer security management/Editor Thomas A. Rullo
Call Number: 658.478 Adv | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Evaluasi infrastruktur keamanan jaringan retail internet banking: studi kasus di PT Bank XYZ Tbk.
Author: Ikrar Adinata Arin; | Call Number: T-0853 (Softcopy T-0507) | Edition: 2009 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   5 6 7 8 9 10 11 12 13 14  Next