Search Result Save to File Save as CSV
Your search for 25348 returns 5213 document(s)
Information systems secutiry/ Royal P. Fisher
Author: Fisher, Royal P.; | Call Number: 658.478 Fis i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security risk analysis and control a guide for the dp manager
Author: Wong, KK; | Call Number: 658.47 Won r | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Principles of data security/ Ernst L. Leiss
Author: Leiss, Ernst L.; | Call Number: 05.8 Lei p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Advances in computer security management/Editor Thomas A. Rullo
Call Number: 658.478 Adv | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
User's guide to computer crime: its commission, detection and prevention/ Stephen W. Leibholz
Author: Leibholz, Stephen W.; | Call Number: 364.1 Lei u | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Handbook of effective disater recovery planning: a seminar/workshop approach/Alvin Arnell
Author: Arnell, Alvin; | Call Number: R.658.478 02 Arn h | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Critical issues in information systems research
Call Number: 004.285 Cri | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Auditing information systems: enhancing performance of the enterprise
Author: Nyirongo, Abraham; | Call Number: 658 Nyi a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The analysis, design, and implementation of information systems 2nd ed.
Author: Lucas, Henry C.; | Call Number: 004 Luc a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Auditing information systems: a comprehensive reference guide/Jack Champlain
Author: Champlain, Jack; | Call Number: 658.5 Cha a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next