Your search for 8867 returns 6565 document(s) |
Using the common criteria for it security evaluation/ Debra S. Hermann |
Author: Hermann, Debra S.; | Call Number: 005.8 Her s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Perancangan strategi pertahanan vital korporat berbasis ISO 27001/27002 studi kasus kementrian X |
Author: Geri Brian Rachmadi; | Call Number: KA-095 (Softcopy KA-095) | Edition: 2011 | Type: Karya Akhir (KA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied cryptography: protocols, algorithms, and sources code in C |
Author: Schmeier, Bruce; | Call Number: 005.82 Sch a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security issues for the internet and the word wide web |
Author: Cameron, Debra; | Call Number: 005.8 Cam s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
ASP/MTS/ADSI web security |
Author: Harrison, Richard; | Call Number: 005.86 Har a | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
ASP/MTS/ADSI web security |
Author: Harrison, Richard; | Call Number: 005.86 Har a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Practical guide to security assessments/ Sudhanshu Kairab |
Author: Kairab, Sudhanshu; | Call Number: 658.478 Kai p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Web security: a step-by step reference guide/Lincon D. Stein |
Author: Stein, Lincoln D.; | Call Number: 005.8 Ste w | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security monitoring |
Author: Fry, Chris; | Call Number: 005.8 Fry s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Using information technology: a practical introduction to computers & communications |
Author: Williams, Brian K.; | Call Number: 004 Wil u | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|