Search Result Save to File Save as CSV
Your search for 25347 returns 3902 document(s)
Computer security management/ Donn B. Parker
Author: Parker, Donn B.; | Call Number: 658.478 Par c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Managing information security: a program for the electronic information age
Author: Schweitzer, James A.; | Call Number: 658.478 Sch m | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Managing information security: a program for the electronic information age/ James A. Schweitzer
Author: Schweitzer, James A.; | Call Number: 658.478 Sch m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography and Data Security
Author: Denning, Dorothy E.; | Call Number: 005.8 Den c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Database security and integrity/ Eduardo B. Fernandez
Author: Fernandez, Eduardo B.; | Call Number: 005.74 Fer d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Principles of data security/ Ernst L. Leiss
Author: Leiss, Ernst L.; | Call Number: 05.8 Lei p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer fraud and cuntermeasures/ Leonard I. Krauss
Author: Krauss, Leonard I.; | Call Number: 364.168 Kra c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information integrity: a structure for its definition & management/ Hal B. Becker
Author: Becker, Hal B.; | Call Number: 658.403 8 Bec i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Foiling the system breakers
Author: Lobel, Jerome; | Call Number: 005.8 Lob f | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography: a primer
Author: Konheim, Alan G.; | Call Number: 526 Kon c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next