Your search for 9250 returns 5895 document(s) |
Internet security made easy: a plain english guide to protecting yourself and your company online/Douglas Schwitzer |
Author: Schweitzer, Douglas; | Call Number: 005.8 Sch i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied cryptography: protocols, algorithms and source code in C |
Author: Schneier, Bruce; | Call Number: 005.82 Sch a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information security and privacy: third Australian conference, ACISP'98/Brisbane, Australia, July 13-15, 1998 proceedings |
Call Number: 005.8 Inf | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Risk management for computer security: protecting your network and information assets |
Author: Jones, Andy; | Call Number: 658.478 Jon r | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
ISO 27001 complete self-assessment guide: practical tools for self-assessment |
Call Number: 005.8 Iso | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network security principles and practices: expert solutions for securing network infrastructures and VPNs/ Saadat Malik |
Author: Malik Saadat; | Call Number: 005. 8 Mal n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Enterprise security architecture: a business-driven approach |
Author: Sherwood, John; | Call Number: 005.8 She e | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Maximum linux security: a hacker's guide to protecting your linux server and workstation |
Author: Anonymous; | Call Number: 005.43 Ano m | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security monitoring |
Author: Fry, Chris; | Call Number: 005.8 Fry s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
DNS security management |
Author: Dooley, Michael; | Call Number: 005.8 Doo d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|