Showing 161 - 180 results of 233 for search '"Security"', query time: 0.02s Refine Results
  1. 161
    by Firrar Utdirartatmo
    Published
    Subjects: ...Mandrake Security Multi Network Firewall (MNF) dikembangkan oleh MandrakeSoft, pembuat dstro...
    TEXT
  2. 162
    by Wheeler, David A.
    Published 2001
    Subjects: ...1. Secure programming Linux and Unix. 2. Linux and Unix -- Operating system...
    TEXT
  3. 163
    by Edwin J. Elton
    Published
    Subjects: ... and analysis of individual securities as well as the theory and practice of optimally combining securities...
    TEXT
  4. 164
    by Martin J. Gruber
    Published
    Subjects: ... and analysis of individual securities as well as the theory and practice of optimally combining securities...
    TEXT
  5. 165
    by Michael Urban
    Published
    Subjects: ...FreeBSD, advanced networking, performance, security, and compatibility features, and it provides...
    TEXT
  6. 166
    by Brian Tiemann
    Published
    Subjects: ...FreeBSD, advanced networking, performance, security, and compatibility features, and it provides...
    TEXT
  7. 167
    by Clifford J. Berg
    Published
    Subjects: ...How to Design for Software Reliability, Security, and Maintainability Many enterprises...
    TEXT
  8. 168
    by Man Young Rhee
    Published
    Subjects: ...The complete guide to building efficient, secure CDMA networks. This timely volume provides...
    TEXT
  9. 169
    by Moh. Rifai
    Published
    Subjects: ...----Secure Email Server -Email antivirus -Email antispam -Pretty Good Privacy -PGP Keyserver...
    TEXT
  10. 170
    by Adhityo Priyambodo
    Published
    Subjects: ...----Secure Email Server -Email antivirus -Email antispam -Pretty Good Privacy -PGP Keyserver...
    TEXT
  11. 171
    by Eric Larson
    Published
    Subjects: ... servers, and Web clients, configuration and maintenance of your site, CGI security, and secure online...
    TEXT
  12. 172
    by Gert De Laet
    Published
    Subjects: ...An introduction to the key tools and technologies used to secure network access * Examine common...
    TEXT
  13. 173
    by damon Hougland
    Published
    Subjects: ...Security is one of the most critical problems facing anyone who is charged with administering...
    TEXT
  14. 174
    by Corey Schou
    Published
    Subjects: ...Going beyond the technical coverage of computer and systems security measures, Information...
    TEXT
  15. 175
    by Dan Shoemaker
    Published
    Subjects: ...Going beyond the technical coverage of computer and systems security measures, Information...
    TEXT
  16. 176
    by Mike Schiller
    Published
    Subjects: ... in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls...
    TEXT
  17. 177
    by Chris Davis
    Published
    Subjects: ... in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls...
    TEXT
  18. 178
    by Thomas J. Cashman
    Published
    Subjects: ... discussions. The book covers client server networks, wireless technology, WANs, LANs, MANs, security...
    TEXT
  19. 179
    by Gary B. Shelly
    Published
    Subjects: ... discussions. The book covers client server networks, wireless technology, WANs, LANs, MANs, security...
    TEXT
  20. 180
    by Wenbo Mao
    Published
    Subjects: ... of cryptography who intends to implement strong security in r...
    TEXT