Your search for 8899 returns 7141 document(s) |
The Basics of information security: understanding the fundamentals of infosec in theory and practice 2nd ed. |
Author: Andress, Jason; | Call Number: 005.8 And b | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information security architecture: an integrated approach to security in the organization 2nd ed. |
Author: Killmeyer, Jan; | Call Number: 005.8 Kil i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secrets and Lies: Digital security in a Networked world whith new information about post 9/11 security |
Author: Schneier, I Bruce; | Call Number: 005.8 Sch s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information security and privacy: third Australian conference, ACISP'98/Brisbane, Australia, July 13-15, 1998 proceedings |
Call Number: 005.8 Inf | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Building internet firewalls |
Author: Zwicky, Elizabeth D.; | Call Number: 005.8 Zwi b | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information integrity: a structure for its definition & management/ Hal B. Becker |
Author: Becker, Hal B.; | Call Number: 658.403 8 Bec i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Building internet firewalls 2nd ed. |
Author: Zwicky, Elizabeth D.; | Call Number: 005.8 Zwi b | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Business continuity planning for data centers and systems |
Author: Bowman, Ronald H.; | Call Number: 658.478 Bow b | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer and information security handbook |
Author: Vacca, John R.; | Call Number: 005.8 Vac c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Principles of information security 5th ed. |
Author: Whitman, Michael E.; | Call Number: 005.8 Whi p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|