-
21
-
22
-
23
-
24
-
25Sirkulasi
-
26
-
27by Amoroso, Edward G.Subjects: “...1. Computer security -- Systems. 2. Data security -- Computer systems. 3. Data encryption...”
Published 1994
TEXT -
28
-
29
-
30by Matt BishopSubjects: “...The nature and challenges of computer security, the relationship between policy and security...”
Published
TEXT -
31
-
32
-
33
-
34
-
35
-
36
-
37
-
38
-
39
-
40