Your search for 25347 returns 3920 document(s) |
Certified information security management (Cism Review Manual 2015) |
Call Number: 658.478 Cer | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information security management handbook 5th ed/ Harold Tipton F. |
Call Number: 658.055 8 Inf | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Certified information security management (CISM Review Manual 2011) |
Call Number: 658.478 Cer | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information security management handbook 4th ed./ editor Harold F. Tiptop |
Call Number: 658.055 8 Inf | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer models in operations management: a computer-augmented system |
Author: Harris, Roy D.; | Call Number: 658.403 2 Har c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer network security: second internaitonal workshop on mathematical methods, models and architectures for computer network security MMM-ACNS 2003 St Petersburg, Russia, Sept' 2003, Proceeding |
Call Number: 005.8 Com | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography: a new dimension in computer data security: a guide for the design and implementation of secure systems |
Author: Meyer, Carl H.; | Call Number: 652.8 Mey c | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Studi model organisasi CSITs (Computer Security Incident Response TEAMS) pada perusahaan berskala besar, HAL. C.61-C.65 |
Author: Riza Kurniawan, Budi Rahardjo; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Protecting global SOA and other security threats, (LNCS-Lecture Notes in Computer Science 5576) Hal 652-661 |
Author: Deven Shah; Ashish Mangal; Mayank Argawal; Mahendra Mehra; Tushar Dave; Dhiren Patel; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A mathematical approach towards trust based security in pervasive computing environment, (LNCS-Lecture Notes in Computer Science 5576) Hal 702-711 |
Author: Naima Iltaf; Mukhtar Hussain; Farrukh Kamran; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|