Search Result
Save to File
Your search for
25664
returns
2864
document(s)
E-Commerce security strategies: protecting the enterprise
Author: Cameron, Debra; | Call Number: 658.478 Cam e | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Network security: how to plan for it and achive it
Author: Baker, Richard H.; | Call Number: 658.478 Bak n | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Privacy, security, and the information processing industry
Call Number: SEM-097 | Type: Prosiding Seminar
Find Similar
|
Add To Favorites
|
Detail in New Window
Konfigurasi Security Policy Selinux (130-133)
Author: Jaki Eko Istiyanto Nurhayati Masthurah; | Call Number: SEM-337 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Infrastructural Map for Information Security (503-512)
Author: Sabah Al-Fedaghi Hanaa Alnashwan; | Call Number: SEM-323 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
National security versus data privacy and security: study of personal data privacy and security in Iran, HAL. 1081-1087
Author: Hassan Allpour and Ebrahim Kiani Harchegant; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Structural analysis
Author: Hibbeler, Russel C.; | Call Number: 624.1 Hib s | Type: Softcopy Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Discourse analysis
Author: Brown, Gillian; | Call Number: 415 Bro d | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Tensor analysis
Author: Nelson, Edward; | Call Number: 515 Nel t | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Matrix analysis
Author: Bhatia, Rajendra; | Call Number: 512.943 4 Bha m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
13
14
15
16
17
18
19
20
21
22
Next