Search Result
Save to File
Your search for
45882
returns
6356
document(s)
Managing risk in information systems
Author: Gibson, Darril; | Call Number: 005.8 Gib m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Managing risk in information systems 2nd ed.
Author: Gibson, Darril; | Call Number: 005.8 Gib m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Assessing and managing security risk in it systems: a structured methodology/ John Mccumber
Author: Mccumber, John; | Call Number: 005.8 Mcc a | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Managing risk: methods for software systems development
Author: Hall, Elaine M.; | Call Number: 005.1 Hal m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Security risk management building an information security risk management program from the ground up
Call Number: 005.8 Whe s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Information security risk analysis/Thomas R.
Author: Poltier, Thomas R.; | Call Number: 005.8 Pel i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Risk management for computer security: protecting your network and information assets
Author: Jones, Andy; | Call Number: 658.478 Jon r | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Protection and security on the information superhighway
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Outsourcing information security/ C. Warren Axelrod
Author: Axelrod C. Warren; | Call Number: 005.8 Axe o | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Roadmap to information security: for it and infosec managers
Author: Whitman, Michael E.; | Call Number: 005.8 Whi r | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev 1
2
3
4
5
6
7
8
9
10
Next