Your search for 24567 returns 6944 document(s) |
Computer fraud and cuntermeasures/ Leonard I. Krauss |
Author: Krauss, Leonard I.; | Call Number: 364.168 Kra c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer security handbook/editor Arthur, E. Hutt Seymour |
Call Number: R.658.478 02 Com | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Iformation systems security |
Author: Fisher, Royal P.; | Call Number: 658.478 Fis | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer security management/ Donn B. Parker |
Author: Parker, Donn B.; | Call Number: 658.478 Par c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The international handbook on computer crime |
Author: Sieber, Ulrich P.; | Call Number: 364.168 Sie i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information integrity: a structure for its definition & management/ Hal B. Becker |
Author: Becker, Hal B.; | Call Number: 658.403 8 Bec i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Advances in computer security management/Editor Thomas A. Rullo |
Call Number: 658.478 Adv | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Principles of data security/ Ernst L. Leiss |
Author: Leiss, Ernst L.; | Call Number: 05.8 Lei p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Algorithms-structured computer arrays and networks: architectures and processors for images percepts, models, information/ Leonard Uhr |
Author: Uhr, Leonard; | Call Number: 004.35 Uhr a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
User's guide to computer crime: its commission, detection and prevention/ Stephen W. Leibholz |
Author: Leibholz, Stephen W.; | Call Number: 364.1 Lei u | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|