Facebook
Twitter
Instagram
Select Language
Arabic
Bengali
Brazilian Portuguese
Chinese
Korean
English
Espanol
German
Indonesian
Thai
Malay
Persian
UMN Library
Excellent Career Begins with Excellent Education
Home
Library Information
Member Area
Librarian
Help On Search
Statistics
Librarian LOGIN
Collections
Back
Search
Search
Author(s)
SEARCHING...
Subject(s)
SEARCHING...
ISBN/ISSN
GMD
All GMD/Media
Text
Art Original
Chart
Computer Software
Diorama
Filmstrip
Flash Card
Game
Globe
Kit
Map
Microform
Manuscript
Model
Motion Picture
Microscope Slide
Music
Picture
Realia
Slide
Sound Recording
Technical Drawing
Transparency
Video Recording
Equipment
Computer File
Cartographic Material
VCD/DVD
Multimedia
Electronic Resource
E-book
print
Collection Type
All Collections
Bachelor's Thesis
Biography
Brochure
CD-ROM
Complementary VCD/DVD
Dictionary
Doctoral Dissertation
Encyclopedia
Fiction
Guidebook/Handbook
Internship
Journal
Leaflet
Magazine
Master's Thesis
Modul
Movie
Pamflet
Poster
Proceeding
Reference
Short Loan
Textbook
Location
All Locations
BI Corner 2ND
Kampus Menara Kompas
My Library
Advanced Search
Found
18
from your keywords:
Subject :
"COMPUTER SECURITY, COMPUTER ACCESS CONTROL"
Query took
0.25024
second(s) to complete
XML Result
Network Security Essentials: Applications and Standards 4th ed
Author(s)
: Stallings, William -
Record Detail
XML Detail
Share to:
Cryptography and Network Security: Principles and Practices 4th edition
Author(s)
: Stallings, William -
Record Detail
XML Detail
Share to:
Computer security : 20 things every employee should know
Author(s)
: Rothke, Ben -
Record Detail
XML Detail
Share to:
Pengamanan PC dari segala ancaman
Author(s)
: Winarno, Edy -
Record Detail
XML Detail
Share to:
Security In Computing 4ed
Author(s)
: Pfleeger, Charles -
Record Detail
XML Detail
Share to:
Modern Cryptanalysis Techniques For Advanced Code Breaking
Author(s)
: Swenson, Christopher -
Record Detail
XML Detail
Share to:
Network Security (2nd edition)
Author(s)
: Cole, Eric -
Record Detail
XML Detail
Share to:
Network Security; Private Communication In a Public World 2ed
Author(s)
: Kaufmann, Charlie -
Record Detail
XML Detail
Share to:
VoIP Deployment for DUMMIES
Author(s)
: Olejniczak, Stephen P. -
Record Detail
XML Detail
Share to:
Principles of Information Security: Third Edition
Author(s)
: Mattord, Herbert J - Whitman, Michael E -
Record Detail
XML Detail
Share to:
Messenger & Mail Hacking Fell Secured?
Author(s)
: Sulianta, Feri -
Record Detail
XML Detail
Share to:
Messenger & Mail Hacking : fell secured?
Author(s)
: Feri Sulianta -
Record Detail
XML Detail
Share to:
Cryptography and network security : principles and practice 7th edition
Author(s)
: Stallings, William -
Record Detail
XML Detail
Share to:
Computer security : principles and practice
Author(s)
: Stallings, William - Brown, Lawrie -
Record Detail
XML Detail
Share to:
Cryptography and network security : principles and practice 3rd edition
Author(s)
: Stallings, William -
Record Detail
XML Detail
Share to:
Computer Forensics for Dummies
Author(s)
: Volonino, Linda -
Record Detail
XML Detail
Share to:
20 Aplikasi Sekuriti
Record Detail
XML Detail
Share to:
Applied Oracle Security: Developing Secure Database and Middleware Environments
Author(s)
: Knox, David -
Record Detail
XML Detail
Share to:
Information
Web Online Public Access Catalog - Use the search options to find documents quickly
Search Cluster
Generating search cluster...