Search Result Save to File Save as CSV
Your search for 9299 returns 3840 document(s)
Physical security for IT/ Michael Erbschloe
Author: Erbschloe, Michael; | Call Number: 005.8 Erb p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information assurance for the enterprise: a roadmap to information security/ Corey Schou
Author: Schou, Corey; | Call Number: 005.8 Sch c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Assessing and managing security risk in it systems: a structured methodology/ John Mccumber
Author: Mccumber, John; | Call Number: 005.8 Mcc a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Protection and security on the information superhighway
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Protection and security on the information superhigway
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Implementing elliptic curve cryptography/Michael Rosing
Author: Rosing, Michael; | Call Number: 005.82 Ros i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Building a global information assurance program/ Raymond J. Curts
Author: Curts, Raymond J.; | Call Number: 005.8 Cur b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information hiding techniques for steganography and digital watermarking/ Stefan Katzenbeisser
Call Number: 005.8 Inf | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Mathematical and computer modelling of physical systems
Author: Rideout, Vincent; | Call Number: 003.3 Rid m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security
Author: editors Virginia, Alexandria; | Call Number: 005.8 Com | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next