Search Result
Save to File
Your search for
2029
returns
6619
document(s)
Certified information security management (CISM Review Manual 2013)
Call Number: 658.478 Cer | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Certified information security management (Cism Review Manual 2015)
Call Number: 658.478 Cer | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Certified information security management (CISM Review Manual 2011)
Call Number: 658.478 Cer | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Managing risk in information systems
Author: Gibson, Darril; | Call Number: 005.8 Gib m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Enterprise security architecture: a business-driven approach
Author: Sherwood, John; | Call Number: 005.8 She e | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer network security: second internaitonal workshop on mathematical methods, models and architectures for computer network security MMM-ACNS 2003 St Petersburg, Russia, Sept' 2003, Proceeding
Call Number: 005.8 Com | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Network security principles and practices: expert solutions for securing network infrastructures and VPNs/ Saadat Malik
Author: Malik Saadat; | Call Number: 005. 8 Mal n | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Security metrics: a beginner's guide
Author: Wong, Caroline S.; | Call Number: 005.8 Won s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Managing risk in information systems 2nd ed.
Author: Gibson, Darril; | Call Number: 005.8 Gib m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Smart card security and applications/Mike Hendry
Author: Hendry, Mike; | Call Number: 006 Hen s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
5
6
7
8
9
10
11
12
13
14
Next