Search Result
Save to File
Your search for
2582
returns
5556
document(s)
Outsourcing information security/ C. Warren Axelrod
Author: Axelrod C. Warren; | Call Number: 005.8 Axe o | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Network and internetwork security principles and practice
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Roadmap to information security: for it and infosec managers
Author: Whitman, Michael E.; | Call Number: 005.8 Whi r | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
An AHP Based-Model For Sustainable Manufacturing Performance Evaluation In Automotive Industry (53)
Author: Elita Amrina Sha'ri Mohd Yusof; | Call Number: SEM-311 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Model bisnis pada industri manufaktur di era informasi melalui pendekatan extended enterprise
Author: Sasmito Budi Utomo; | Call Number: KA-285 (Softcopy KA-283) | Edition: 2012 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Inside Internet Security: What hackers don't want you to know.../Jeff Crume
Author: Crume, Jeff; | Call Number: 005.8 Cru i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Microsoft windows security resource kit
Author: Smith, Ben; | Call Number: 005.8 Smi m | Type: Softcopy Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Microsoft windows security resource kit
Author: Smith, Ben; | Call Number: 005.8 Smi m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Survey of vulnerability and security of mobile ad hoc networks
Author: Siddharth S Rautaray and Sanjeev Sharma; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Memahami modul enkripsi dan security data/
Call Number: 005.8 Mem (MTI SLB) | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
17
18
19
20
21
22
23
24
25
26
Next