Search Result
Save to File
Your search for
8899
returns
7141
document(s)
Certified information security management (CISM Review Manual 2013)
Call Number: 658.478 Cer | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Certified information security management (Cism Review Manual 2015)
Call Number: 658.478 Cer | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Certified information security management (CISM Review Manual 2011)
Call Number: 658.478 Cer | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Information security risk analysis/Thomas R.
Author: Poltier, Thomas R.; | Call Number: 005.8 Pel i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Elliptic curves in cryptography
Author: Blacke, Ian F.; | Call Number: 005.82 Bla c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Data structures, algorithms and program style/James F. Korsh
Author: Korsh, James F.; | Call Number: 005.73 Kor d | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Cryptography and Data Security
Author: Denning, Dorothy E.; | Call Number: 005.8 Den c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Implementing elliptic curve cryptography/Michael Rosing
Author: Rosing, Michael; | Call Number: 005.82 Ros i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Executive guide to preventing information technology disasters/Richard Ennals
Author: Ennals, Richard; | Call Number: 658.478 Enn e | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Digital certificates: applied internet security
Author: Feghhi, Jalal; | Call Number: 005.8 Feg d | Type: Softcopy Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
2
3
4
5
6
7
8
9
10
11
Next