Search Result
Save to File
Your search for
19847
returns
2685
document(s)
Electronic commerce relationships: trust by design/Peter Keen
Call Number: 005.8 Ele | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Cryptography and network security: principles and practice 3rd ed.
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Advances in computer security management/Editor Thomas A. Rullo
Call Number: 658.478 Adv | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Maximum linux security: a hacker's guide to protecting your linux server and workstation
Author: Anonymous; | Call Number: 005.43 Ano m | Type: Softcopy Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Microsoft windows security inside out for windows XP and windows 2000
Author: Bott, Ed; | Call Number: 005.8 Bot m | Type: Softcopy Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Certified information security management (CISM Review Manual 2013)
Call Number: 658.478 Cer | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Certified information security management (Cism Review Manual 2015)
Call Number: 658.478 Cer | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Microsoft windows security inside out for windows XP and windows 2000
Author: Bott, Ed; | Call Number: 005.8 Bot m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Assessing and managing security risk in it systems: a structured methodology/ John Mccumber
Author: Mccumber, John; | Call Number: 005.8 Mcc a | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Certified information security management (CISM Review Manual 2011)
Call Number: 658.478 Cer | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
18
19
20
21
22
23
24
25
26
27
Next