Search Result Save to File Save as CSV
Your search for 1893 returns 6668 document(s)
Knowledge based information systems/D. Patridge, K.M. Hussain
Author: Partridge, Derek; | Call Number: 006.33 Par k | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Management information systems: managing information technology in the internet worked enterprise
Author: Obrien, James A.; | Call Number: 658.403 8 Obr m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Managing information security: a program for the electronic information age/ James A. Schweitzer
Author: Schweitzer, James A.; | Call Number: 658.478 Sch m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Database security and integrity/ Eduardo B. Fernandez
Author: Fernandez, Eduardo B.; | Call Number: 005.74 Fer d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
A Study on the Preparedness of Information Security Framework Area based on the Assessment of Information Security Index in Ministry of XYZ (55-60)
Author: Mufti Rizal Yudho Giri Sucahyo; | Call Number: SEM-319 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Philosophy of computing and information
Call Number: 004.01 Phi | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Inside network perimeter security: the definitve guide to firewalls, VPNs, routers, and instruction Detection
Author: Northcutt, Stephen...[et. al.]; | Call Number: 005.8 Ins | Edition: 2003 | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Applied cryptography and network security : first internal conference ACNS 2003, Kunnings, China, October 16-19, 2003, Proceedings
Author: Zhou, Jianjing; | Call Number: 005.8 Zho o | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Analisa SI/TI security pada BPR/BKK pasca merger: studi kasus Bank PD. BPR BKK Talang merger
Author: I Nyoman Jamin; | Call Number: KA-114 (Softcopy KA-114) | Edition: 2011 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography: a primer
Author: Konheim, Alan G.; | Call Number: 526 Kon c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   19 20 21 22 23 24 25 26 27 28  Next