Search Result
Save to File
Your search for
8899
returns
7141
document(s)
Cryptography and network security: principles and practice 3rd ed.
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Digital certificates: applied internet security
Author: Feghhi, Jalal; | Call Number: 005.8 Feg d | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Data authentication protocol modeling on multilayer data hiding for multilayer protocol hiding. hal, 112
Author: Christian Gustav; | Call Number: SEM-317 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Internet cryptography
Author: Smith, Richard E.; | Call Number: 005.82 Smi i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
The Strategic management of information systems: building a digital strategy 4th ed.
Author: Peppard, Joe; | Call Number: 004.068 Pep s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
IT auditing : using controls to protect iformation assets 2nd ed
Author: Davis, Chris; | Call Number: 658.05 Dav i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Data communications for distributed information systems
Author: Chorafas, Dimitris N.; | Call Number: 004.6 Cho d | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Hacking: the art of exploitation 2nd ed.
Author: Erickson, Jon; | Call Number: 005.8 Eri h | Type: Softcopy Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer security principles and practice 3 rd ed.
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
The Shellcoder's handbook: discovering and exploiting security holes 2nd ed.
Call Number: 005.8 She | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
3
4
5
6
7
8
9
10
11
12
Next