Search Result Save to File Save as CSV
Your search for 25347 returns 3920 document(s)
The CISSP perp guide: mastering teh ten domains of computer security/ Ronald L. Krutz
Author: Krutz, Ronald L.; | Call Number: 005.8 Kru c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
An Introduction to computer security: 12th International conference software engineering March 26-30, 1990
Call Number: SEM-148 | Type: Prosiding Seminar
Find Similar |  Add To Favorites |  Detail in New Window 
Computer Security and Ethics Awareness Among IIUM University Students: an Empirical Study (A52-A56)
Author: Mansur Aliyu, Nahel Abdallah, Lasisi Nojeem, Dahir Diyar and Ahmed M. Zeki; | Call Number: SEM-384 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Perencanaan Kebijakan Keamanan Informasi Berdasarkan Information Security Management System [ISMS] ISO 27001 studi kasus Bank XYZ
Author: Aries Fajar Kurnia; | Call Number: PA-0087 (Softcopy PA-0087) | Edition: 2006 | Type: Proyek Akhir (PA)
Find Similar |  Add To Favorites |  Detail in New Window 
E-Government information security management system by ISO/IEC 27001:2005, A-14 - A-18
Author: Rumadi Hartawan; | Call Number: SEM-352 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Strategi manajemen perubahan untuk mendukung implementasi information security management system : studi kasus Bank XYZ Divisi Teknologi Informasi
Author: Farida Noorseptiyanti; | Call Number: KA-218 (Softcopy KA-217) | Edition: 2011 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Distributed computer systems: impac on management, design and analysis
Author: Champine, George A.; | Call Number: 004 Cha d | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Computer procductivity planning guide for cost effective management
Author: Axelrod, Warman; | Call Number: 658.403 8 Axe | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Computer handbook for senior management/ Douglas B. Hoyt
Call Number: 004 Com | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
On the security propeties and attacks againts mobile agent graph head scaling (MGHS), (LNCS-Lecture Notes in Computer Science 5576) Hal. 223-228
Author: Abid Khan; Qasim Arshad; Xiamu Niu; Zhang Yong; Muhammad Waqas Anwar; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   4 5 6 7 8 9 10 11 12 13  Next