Search Result Save to File Save as CSV
Your search for 14018 returns 1164 document(s)
Protecting Privacy Using the Decentralized Label Model, page 410-442
Author: Andrew C. Myers, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
The Computer incident response planning handbook: Executable plans for protecting information at risk
Author: McCarthy, N.K.; | Call Number: 005.8 Mcc c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Risk management for computer security: protecting your network and information assets
Author: Jones, Andy; | Call Number: 658.478 Jon r | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Clairvoyant: a cloud-based file surveillance application for protecting confidential files
Author: Rizki Mubarok; | Call Number: KP-2294 (Softcopy 1856) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan aplikasi pengaturan content
Author: Gunawan; | Call Number: KP-0736 (Softkopi KP-305) (SCKP-180) | Type: Kerja Praktek (KP)
Find Similar |  Add To Favorites |  Detail in New Window 
Managing information technology projects
Author: Mcleod, Graham; | Call Number: 658.403 8 McL m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Managing information systems for profit
Author: Tim Lincoln; | Call Number: 658.403 8 Man t | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Managing information for the competitive edge
Call Number: 658.403 8 Man | Edition: 1996 | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Managing with Web-based IT in Mind
Author: Ned Kock | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Managing International Data Communications
Author: Vincent S. Lai, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next