First Page   Previous   1   2   3   4   5   Last Page 
Effective cyber security : a guide to using best practices and standards

Effective cyber security : a guide to using best practices and standards

Edition :
Call Number : 005.8 STA e
Availability : 1 copies available for loan
International conference on data management

International conference on data management

Edition :
Call Number : P 004 INT
Availability : 1 copies available for loan
The art of invisibility : the world's most famous hacker teaches you how to be safe in the age of big brother and big data

The art of invisibility : the world's most famous hacker teaches you how to be safe in the age of big brother and big data

Edition :
Call Number : 005.8 MIT a
Availability : 1 copies available for loan
CISA : certified information systems auditor : study guide

CISA : certified information systems auditor : study guide

Edition : 4th ed.
Call Number : 005.8076 CAN c
Availability : 1 copies available for loan
Computer security

Computer security

Edition :
Call Number : 005.8 ARI c
Availability : 1 copies available for loan
Research methods for cyber security

Research methods for cyber security

Edition :
Call Number : 005.8072 EDG r
Availability : 1 copies available for loan
Audio content security : attack analysis on audio watermarking

Audio content security : attack analysis on audio watermarking

Edition :
Call Number : 005.8 GHO a
Availability : 1 copies available for loan
Cryptography and network security

Cryptography and network security

Edition : International ed.
Call Number : 005.8 FOR c
Availability : 1 copies available for loan
Cryptography and network security : principles and practice

Cryptography and network security : principles and practice

Edition : 6th ed.
Call Number : 005.8 STA c
Availability : 1 copies available for loan
Computer security : principles and practice

Computer security : principles and practice

Edition : 2nd ed.
Call Number : 005.8 STA cs
Availability : 1 copies available for loan
 First Page   Previous   1   2   3   4   5   Last Page 

Search Result


Found 42 from your keywords: Subject : "Computer security"
You currently on page 3 of 5 page(s)
Query took 0.08302 second(s) to complete
XML ResultJSON Result

Information


Matana University Online Public Access Catalog. For assistance, contact your librarian by email library@matanauniversity.ac.id.