Your search for 9211 returns 4224 document(s) |
Cryptography: a new dimension in computer data security: a guide for the design and implementation of secure systems |
Author: Meyer, Carl H.; | Call Number: 652.8 Mey c | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and Data Security |
Author: Denning, Dorothy E.; | Call Number: 005.8 Den c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and network security: principles and practice 3rd ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Introduction to cryptography: Principles and applications |
Author: Delfs, Hans; | Call Number: 005.82 Del i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Business continuity planning for data centers and systems |
Author: Bowman, Ronald H.; | Call Number: 658.478 Bow b | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security metrics: a beginner's guide |
Author: Wong, Caroline S.; | Call Number: 005.8 Won s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Elliptic curves in cryptography |
Author: Blacke, Ian F.; | Call Number: 005.82 Bla c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied cryptography and network security : first internal conference ACNS 2003, Kunnings, China, October 16-19, 2003, Proceedings |
Author: Zhou, Jianjing; | Call Number: 005.8 Zho o | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information assurance for the enterprise: a roadmap to information security/ Corey Schou |
Author: Schou, Corey; | Call Number: 005.8 Sch c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information security management : Concepts and Practice |
Author: Raggad, Bel G.; | Call Number: 005.8 Rag i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|