Search Result
Save to File
Your search for
14018
returns
1164
document(s)
Protecting Privacy Using the Decentralized Label Model, page 410-442
Author: Andrew C. Myers, [et all] | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
The Computer incident response planning handbook: Executable plans for protecting information at risk
Author: McCarthy, N.K.; | Call Number: 005.8 Mcc c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Risk management for computer security: protecting your network and information assets
Author: Jones, Andy; | Call Number: 658.478 Jon r | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Clairvoyant: a cloud-based file surveillance application for protecting confidential files
Author: Rizki Mubarok; | Call Number: KP-2294 (Softcopy 1856) | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Pengembangan aplikasi pengaturan content
Author: Gunawan; | Call Number: KP-0736 (Softkopi KP-305) (SCKP-180) | Type: Kerja Praktek (KP)
Find Similar
|
Add To Favorites
|
Detail in New Window
Managing information technology projects
Author: Mcleod, Graham; | Call Number: 658.403 8 McL m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Managing information systems for profit
Author: Tim Lincoln; | Call Number: 658.403 8 Man t | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Managing information for the competitive edge
Call Number: 658.403 8 Man | Edition: 1996 | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Managing with Web-based IT in Mind
Author: Ned Kock | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Managing International Data Communications
Author: Vincent S. Lai, [et all] | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
1
2
3
4
5
6
7
8
9
10
Next