Search Result
Save to File
Your search for
25347
returns
3902
document(s)
Security metrics: a beginner's guide
Author: Wong, Caroline S.; | Call Number: 005.8 Won s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
COBIT 5 : For Information Security
Call Number: 004.068 Cob | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Designing security architecture solution
Author: Ramachandran, Jay; | Call Number: 005.8 Ram d | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Protection and security on the information superhigway
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
IT Audit, control, and security
Author: Moeller, Robert R.; | Call Number: 658.4 Moe i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Physical security for IT/ Michael Erbschloe
Author: Erbschloe, Michael; | Call Number: 005.8 Erb p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Database security/Silvano Castano
Call Number: 005.8 Dat | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Professional web services security
Call Number: 005.8 Pro | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Data bases in digital libraries : where computer science and information management meet, Hal. 224-234
Author: Judith Klavana; | Call Number: SEM-243 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
A key recovery mechanism for reliable group key management, (LNCS-Lecture Notes in Computer Science 2576) Hal 372-386
Author: Taenam Cho; Sang-Ho Lee; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
7
8
9
10
11
12
13
14
15
16
Next