Facebook
Twitter
Instagram
Select Language
Arabic
Bengali
Brazilian Portuguese
Chinese
Korean
English
Espanol
German
Indonesian
Thai
Malay
Persian
UMN Library
Excellent Career Begins with Excellent Education
Home
Library Information
Member Area
Librarian
Help On Search
Statistics
Librarian LOGIN
Collections
Back
Search
Search
Author(s)
SEARCHING...
Subject(s)
SEARCHING...
ISBN/ISSN
GMD
All GMD/Media
Text
Art Original
Chart
Computer Software
Diorama
Filmstrip
Flash Card
Game
Globe
Kit
Map
Microform
Manuscript
Model
Motion Picture
Microscope Slide
Music
Picture
Realia
Slide
Sound Recording
Technical Drawing
Transparency
Video Recording
Equipment
Computer File
Cartographic Material
VCD/DVD
Multimedia
Electronic Resource
E-book
print
Collection Type
All Collections
Bachelor's Thesis
Biography
Brochure
CD-ROM
Complementary VCD/DVD
Dictionary
Doctoral Dissertation
Encyclopedia
Fiction
Guidebook/Handbook
Internship
Journal
Leaflet
Magazine
Master's Thesis
Modul
Movie
Pamflet
Poster
Proceeding
Reference
Short Loan
Textbook
Location
All Locations
BI Corner 2ND
Kampus Menara Kompas
My Library
Advanced Search
Found
54
from your keywords:
Subject :
"Computer security"
Query took
0.24327
second(s) to complete
XML Result
1
2
3
Next
Last Page
ISACA journal : regulations & compliance Vol. 4, 2015
Author(s)
: ISACA -
Record Detail
XML Detail
Share to:
ISACA Journal : The Internet of Things Adapt. Survive. Thrive Vol. 6, 2015
Author(s)
: ISACA -
Record Detail
XML Detail
Share to:
ISACA Journal : Cybersecurity 360-Degree Vision Vol. 5, 2015
Author(s)
: ISACA -
Record Detail
XML Detail
Share to:
The basics of cyber safety : computer and mobile device safety made easy
Author(s)
: Cross, Michael - Samson, John -
Record Detail
XML Detail
Share to:
Black Hat Python : Python programming for hackers and pentesters
Author(s)
: Seitz, Justin -
Record Detail
XML Detail
Share to:
The hacker playbook 2 : practical guide to penetration testing
Author(s)
: Kim, Peter -
Record Detail
XML Detail
Share to:
Rahasia Menghemat Ruang Hard Disk
Author(s)
: Jubilee Enterprise -
Record Detail
XML Detail
Share to:
60 Trik Rahasia Teknik Menyelematkan Data
Author(s)
: Jubilee Enterprise -
Record Detail
XML Detail
Share to:
Kali Linux Wireless Penetration Testing Beginner's Guide : Master Wireless Testing Techniques to Survey and Attack Wireless Networks with Kali Linux
Author(s)
: Ramachandran, Vivek - Buchanan, Cameron -
Record Detail
XML Detail
Share to:
Network Security Essentials: Applications and Standards 4th ed
Author(s)
: Stallings, William -
Record Detail
XML Detail
Share to:
Cryptography and Network Security: Principles and Practices 4th edition
Author(s)
: Stallings, William -
Record Detail
XML Detail
Share to:
On The Spot Hacking
Author(s)
: Thor -
Record Detail
XML Detail
Share to:
Computer security : 20 things every employee should know
Author(s)
: Rothke, Ben -
Record Detail
XML Detail
Share to:
Hard Disk
Author(s)
: Sanusi, Muzammil -
Record Detail
XML Detail
Share to:
Teknik Mengamankan Data & Sistem Komputer
Author(s)
: Kurniawan, Dedik -
Record Detail
XML Detail
Share to:
77 Trik Rahasia Backup Data
Author(s)
: Jubilee Enterprise -
Record Detail
XML Detail
Share to:
Security of Mobile Communications
Author(s)
: Boudriga, Noureddine -
Record Detail
XML Detail
Share to:
Applied cryptography : protocols, algorithms, and source code in C, 2nd edition
Author(s)
: Schneier, Bruce -
Record Detail
XML Detail
Share to:
Practical reverse engineering : x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation
Author(s)
: Dang, Bruce - Gazet, Alexandre - Bachaalany, Elias - Josse, Sébastien -
Record Detail
XML Detail
Share to:
Pengamanan PC dari segala ancaman
Author(s)
: Winarno, Edy -
Record Detail
XML Detail
Share to:
1
2
3
Next
Last Page
Information
Web Online Public Access Catalog - Use the search options to find documents quickly
Search Cluster
Generating search cluster...