Search Result Save to File Save as CSV
Your search for 14895 returns 3781 document(s)
Security issues in data warehouseing, HAL. 346-351
Author: Kunjal B. Joshi; | Call Number: SEM-291 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Information security tools & techniques, HAL. 1088-1096
Author: T.V. Prasad Viswanath Tangirola; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Network design security and management, HAL. 309-314
Author: V.B. Waghmare; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Solaris Shield basic security module
Call Number: 005.43 Sol | Type: Buku Manual
Find Similar |  Add To Favorites |  Detail in New Window 
Solaris security, performance, and accounting administration
Call Number: 005.43 Sol | Type: Buku Manual
Find Similar |  Add To Favorites |  Detail in New Window 
Principles of information security 5th ed.
Author: Whitman, Michael E.; | Call Number: 005.8 Whi p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Management of information security 5th ed.
Author: Whitman, Michael E.; | Call Number: 005.8 Whi m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Introduction to health information privacy and security
Author: Rinehart-Thompson, Laurie A.; | Call Number: 610.68 Rin i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Corporate computer security 4th ed.
Author: Boyle, Randall J.; | Call Number: 005.8 Boy c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Readings and cases in the management of information security
Author: Whitman, Michael E.; | Call Number: 005.8 Whi r | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   15 16 17 18 19 20 21 22 23 24  Next