Your search for 25347 returns 3920 document(s) |
The CISSP perp guide: mastering teh ten domains of computer security/ Ronald L. Krutz |
Author: Krutz, Ronald L.; | Call Number: 005.8 Kru c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An Introduction to computer security: 12th International conference software engineering March 26-30, 1990 |
Call Number: SEM-148 | Type: Prosiding Seminar
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer Security and Ethics Awareness Among IIUM University Students: an Empirical Study (A52-A56) |
Author: Mansur Aliyu, Nahel Abdallah, Lasisi Nojeem, Dahir Diyar and Ahmed M. Zeki; | Call Number: SEM-384 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Perencanaan Kebijakan Keamanan Informasi Berdasarkan Information Security Management System [ISMS] ISO 27001 studi kasus Bank XYZ |
Author: Aries Fajar Kurnia; | Call Number: PA-0087 (Softcopy PA-0087) | Edition: 2006 | Type: Proyek Akhir (PA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
E-Government information security management system by ISO/IEC 27001:2005, A-14 - A-18 |
Author: Rumadi Hartawan; | Call Number: SEM-352 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Strategi manajemen perubahan untuk mendukung implementasi information security management system : studi kasus Bank XYZ Divisi Teknologi Informasi |
Author: Farida Noorseptiyanti; | Call Number: KA-218 (Softcopy KA-217) | Edition: 2011 | Type: Karya Akhir (KA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Distributed computer systems: impac on management, design and analysis |
Author: Champine, George A.; | Call Number: 004 Cha d | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer procductivity planning guide for cost effective management |
Author: Axelrod, Warman; | Call Number: 658.403 8 Axe | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer handbook for senior management/ Douglas B. Hoyt |
Call Number: 004 Com | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On the security propeties and attacks againts mobile agent graph head scaling (MGHS), (LNCS-Lecture Notes in Computer Science 5576) Hal. 223-228 |
Author: Abid Khan; Qasim Arshad; Xiamu Niu; Zhang Yong; Muhammad Waqas Anwar; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|