Search Result
Save to File
Your search for
25769
returns
4710
document(s)
Principles of data security/ Ernst L. Leiss
Author: Leiss, Ernst L.; | Call Number: 05.8 Lei p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Cryptography and Data Security
Author: Denning, Dorothy E.; | Call Number: 005.8 Den c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer security risk analysis and control a guide for the dp manager
Author: Wong, KK; | Call Number: 658.47 Won r | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Advances in computer security management/Editor Thomas A. Rullo
Call Number: 658.478 Adv | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Database security and integrity/ Eduardo B. Fernandez
Author: Fernandez, Eduardo B.; | Call Number: 005.74 Fer d | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Information integrity: a structure for its definition & management/ Hal B. Becker
Author: Becker, Hal B.; | Call Number: 658.403 8 Bec i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Information systems secutiry/ Royal P. Fisher
Author: Fisher, Royal P.; | Call Number: 658.478 Fis i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer security management/ Donn B. Parker
Author: Parker, Donn B.; | Call Number: 658.478 Par c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Managing information security: a program for the electronic information age
Author: Schweitzer, James A.; | Call Number: 658.478 Sch m | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Managing information security: a program for the electronic information age/ James A. Schweitzer
Author: Schweitzer, James A.; | Call Number: 658.478 Sch m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev 1
2
3
4
5
6
7
8
9
10
Next