Search Result
Save to File
Your search for
9250
returns
5911
document(s)
Practical unix security/Simson Garfinkel and Gene Spafford
Author: Garfinkel, Simson; | Call Number: 005.8 Gar p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Building a global information assurance program/ Raymond J. Curts
Author: Curts, Raymond J.; | Call Number: 005.8 Cur b | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
The Basics of hacking and penetration testing: ethical hacking and penetration testing made easy 2nd ed.
Author: Engebretson, Patrick; | Call Number: 005.8 Eng b | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Cryptography and computational number theory
Call Number: 005.8 Cry | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Implementing the ISO/IEC 27001 ISMS standard 2nd ed.
Author: Humphreys, Edward; | Call Number: 005.8 Hum i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Practical firewalls/Terry William Ogletree
Author: Ogletree, Terry William; | Call Number: 005.8 Ogl p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Building internet firewalls 2nd ed.
Author: Zwicky, Elizabeth D.; | Call Number: 005.8 Zwi b | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Building internet firewalls
Author: Zwicky, Elizabeth D.; | Call Number: 005.8 Zwi b | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Perancangan implementasi sistem keamanan jaringan berbasis VPN pada sebuah perusahaan studi kasus: PT DANAREKSA
Author: Riska Adriyani; | Call Number: T-0326 (Softcopy T-0148) | Edition: 2002 | Type: Tesis
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer organization: hardware/software 2nd ed./ George W. Gorline
Author: Gorsline, George W.; | Call Number: 004 Gor c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
17
18
19
20
21
22
23
24
25
26
Next