Search Result Save to File Save as CSV
Your search for 8867 returns 6565 document(s)
Using the common criteria for it security evaluation/ Debra S. Hermann
Author: Hermann, Debra S.; | Call Number: 005.8 Her s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan strategi pertahanan vital korporat berbasis ISO 27001/27002 studi kasus kementrian X
Author: Geri Brian Rachmadi; | Call Number: KA-095 (Softcopy KA-095) | Edition: 2011 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Applied cryptography: protocols, algorithms, and sources code in C
Author: Schmeier, Bruce; | Call Number: 005.82 Sch a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Security issues for the internet and the word wide web
Author: Cameron, Debra; | Call Number: 005.8 Cam s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
ASP/MTS/ADSI web security
Author: Harrison, Richard; | Call Number: 005.86 Har a | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
ASP/MTS/ADSI web security
Author: Harrison, Richard; | Call Number: 005.86 Har a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
A Practical guide to security assessments/ Sudhanshu Kairab
Author: Kairab, Sudhanshu; | Call Number: 658.478 Kai p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Web security: a step-by step reference guide/Lincon D. Stein
Author: Stein, Lincoln D.; | Call Number: 005.8 Ste w | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Security monitoring
Author: Fry, Chris; | Call Number: 005.8 Fry s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Using information technology: a practical introduction to computers & communications
Author: Williams, Brian K.; | Call Number: 004 Wil u | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next