Search Result
Save to File
Your search for
9211
returns
4225
document(s)
Cryptography and coding 9th IMA international conference Cirencester, UK December 2003 proceedings/ Kenneth G. Paterson
Call Number: 005.82 Cry | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Lecture notes in computer science: cryptography: proceedings Burg Feuerstein 1982/ edited by Thomas Beth
Call Number: 005.82 Lec | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Foiling the system breakers: computer security and access control/ Jerome Lobel
Author: Lobel, Jerome; | Call Number: 005.8 Lob f | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Assessing and managing security risk in it systems: a structured methodology/ John Mccumber
Author: Mccumber, John; | Call Number: 005.8 Mcc a | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Protection and security on the information superhighway
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Protection and security on the information superhigway
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Memahami modul enkripsi dan security data/
Call Number: 005.8 Mem (MTI SLB) | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Cryptography theory and practice 3rd ed.
Author: Stinson, Douglas R.; | Call Number: 005.8 Sti c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
National security versus data privacy and security: study of personal data privacy and security in Iran, HAL. 1081-1087
Author: Hassan Allpour and Ebrahim Kiani Harchegant; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Information security management handbook 4th ed./ editor Harold F. Tiptop
Call Number: 658.055 8 Inf | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
1
2
3
4
5
6
7
8
9
10
Next