Search Result
Save to File
Your search for
10387
returns
1347
document(s)
The Performance Indicator Model for Measuring the Network and Communication of the Information technology Strategic Plan Implementation (23)
Author: Yusmadi Yah Jusoh Abdul Razak Hamdan Aziz Deraman; | Call Number: SEM-307 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Advances in computer security management/Editor Thomas A. Rullo
Call Number: 658.478 Adv | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Maximum linux security: a hacker's guide to protecting your linux server and workstation
Author: Anonymous; | Call Number: 005.43 Ano m | Type: Softcopy Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Microsoft windows security inside out for windows XP and windows 2000
Author: Bott, Ed; | Call Number: 005.8 Bot m | Type: Softcopy Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Certified information security management (CISM Review Manual 2013)
Call Number: 658.478 Cer | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Certified information security management (Cism Review Manual 2015)
Call Number: 658.478 Cer | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Microsoft windows security inside out for windows XP and windows 2000
Author: Bott, Ed; | Call Number: 005.8 Bot m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Assessing and managing security risk in it systems: a structured methodology/ John Mccumber
Author: Mccumber, John; | Call Number: 005.8 Mcc a | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Certified information security management (CISM Review Manual 2011)
Call Number: 658.478 Cer | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Information security risk analysis/Thomas R.
Author: Poltier, Thomas R.; | Call Number: 005.8 Pel i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
12
13
14
15
16
17
18
19
20
21
Next