Search Result Save to File Save as CSV
Your search for 25347 returns 3902 document(s)
Security metrics: a beginner's guide
Author: Wong, Caroline S.; | Call Number: 005.8 Won s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
COBIT 5 : For Information Security
Call Number: 004.068 Cob | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Designing security architecture solution
Author: Ramachandran, Jay; | Call Number: 005.8 Ram d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Protection and security on the information superhigway
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
IT Audit, control, and security
Author: Moeller, Robert R.; | Call Number: 658.4 Moe i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Physical security for IT/ Michael Erbschloe
Author: Erbschloe, Michael; | Call Number: 005.8 Erb p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Database security/Silvano Castano
Call Number: 005.8 Dat | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Professional web services security
Call Number: 005.8 Pro | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Data bases in digital libraries : where computer science and information management meet, Hal. 224-234
Author: Judith Klavana; | Call Number: SEM-243 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A key recovery mechanism for reliable group key management, (LNCS-Lecture Notes in Computer Science 2576) Hal 372-386
Author: Taenam Cho; Sang-Ho Lee; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   7 8 9 10 11 12 13 14 15 16  Next