Search Results

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    E-security law & strategy by Zaid Hamzah

    Published 2005
  2. 2

    How to cheat at managing information security by Osborne, Mark

    Published 2006
  3. 3

    Build your own security lab : a field guide for network testing by Gregg, Micheal (Micheal C.)

    Published 2008
  4. 4

    Making the most of RFID in libraries by Palmer, Martin

    Published 2009
  5. 5

    Cryptography & network security by Forouzan, Behrouz A.

    Published 2008
  6. 6

    Cryptography and network security by Kahate, Atul

    Published 2008
  7. 7

    IT auditing : using controls to protect information assets by Davis, Chris

    Published 2007
  8. 8

    Network security : the complete reference by Bragg, Roberta

    Published 2005
  9. 9

    Cryptography and network security by Bagad, V.S

  10. 10

    Strategi Wifi anti-hacking by Wan Ahmad

  11. 11

    Koleksi lengkap Software Hacking & teknik penghalang by Nik Fauzi

  12. 12

    Teknik Wireless Hacking dan cara pembendungannya by Nik Fauzi

  13. 13

    Designing an IAM Framework with oracle identity and access management suite by Scheidel, Jeff

    Published 2010