Search Result Save to File Save as CSV
Your search for 19847 returns 2716 document(s)
Information assurance for the enterprise: a roadmap to information security/ Corey Schou
Author: Schou, Corey; | Call Number: 005.8 Sch c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Network security in the'90s :issues and solutions for managers/Thomas W. Madron
Author: Madron, Thomas William; | Call Number: 005.8 Mad n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Wireless Security Models, Threats, and Solutions/ Randall K. Nichols & Panos C. Lekkas
Author: Nichols, Randal K.; | Call Number: 384 Nic w [MTI] | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The multibus design guidebook: structures, architectures, and applications
Author: Johnson, James B.; | Call Number: 621.381 Joh m | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Network design cookbook: architecting cisco networks
Author: Thomatis, Michel; | Call Number: 004.65 Tho n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Pemodelan arsitektur enterprise menggunakan enterprise architecture planning untuk mendukung Sistem Informasi terintegrasi bidang Akademik di STMIK Darmajaya Bandar Lampung
Author: Handoyo Widi Nugroho; | Call Number: T-0700 (Softcopy T-0355) | Edition: 2008 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Analisis tingkat kematangan service oriented architecture berdasarkan oracle SOA maturity model: studi kasus PT Bank muamalat Indonesia
Author: Arif Mudrik; | Call Number: KA-1007 (Softcopy KA-1004) MAK KA-657 | Edition: 2017 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Analisis tingkat kematangan service-oriented architecture berbasiskan the open group service integration maturity model: studi kasus pada PT.Bank XYZ
Author: Faisal; | Call Number: KA-670 (Softcopy KA-668) MAK KA-329 | Edition: 2015 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Introduction to health information privacy and security
Author: Rinehart-Thompson, Laurie A.; | Call Number: 610.68 Rin i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information security management : Concepts and Practice
Author: Raggad, Bel G.; | Call Number: 005.8 Rag i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   12 13 14 15 16 17 18 19 20 21  Next