Your search for 8867 returns 6531 document(s) |
Network and internetwork security principles and practice |
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Roadmap to information security: for it and infosec managers |
Author: Whitman, Michael E.; | Call Number: 005.8 Whi r | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
IT manager's guide to virtual private networks/David Clark |
Author: Clark, David Leon; | Call Number: 005.8 Cla i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer electrical power requirements |
Author: Waller, Mark; | Call Number: 004.07 Wal c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information technology in business: principles, practices, and opportunities/James A. Senn |
Author: Senn, James A.; | Call Number: 650.028 5 Sen i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security management by Carcmier, Jaques A. Overbeek Paul L. |
Author: Cazcmier, Jacques A.; | Call Number: 658.403 8 Car s | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Building database applications on the web using PHP 3 |
Author: Hilton, Craig; | Call Number: 005.276 2 Hil b Title | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Building database applications on the web using PHP 3 |
Author: Hilton, Craig; | Call Number: 005.276 2 Hil b | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Perancangan security operation center (SOC): studi kasus PT XYZ |
Author: Kristiadi Himawan; | Call Number: KA-1069 (Softcopy KA-1065) MAK KA-714 | Edition: 2018 | Type: Karya Akhir (KA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Internet Besieged: Countering Cyberspace Scofflans/Dorothy Denning and Peter J. Denning |
Author: Denning Dorothy E.; | Call Number: 364.168 Int | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|