Search Result
Save to File
Your search for
26203
returns
3914
document(s)
Cybersecurity ( Knowledge sharing series issue 2)
Author: Youm, Heung Youl; | Call Number: 658.4 You c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
COBIT 5 : Process assessment model (PAM): using cobit 5
Call Number: 004.068 Cob | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
COBIT 5 : Self-assessment guide: using cobit 5
Call Number: 004.068 Cob | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
COBIT 5 : Enabling processes
Call Number: 004.068 Cob | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Strategies for information technology governance/ Wim Van Grembergen editor
Author: Wim Van Grembergen; | Call Number: 658.403 8 Wim s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Administering data centers: server, storage, and voice over IP
Author: Jayaswal, Kailash; | Call Number: 004.068 Jay a | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
COBIT 5 : For Risk
Call Number: 004.068 Cob | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
COBIT 5 : Implementation
Call Number: 004.068 Cob | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
COBIT 5 : For Assurance
Call Number: 004.068 Cob | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
COBIT 5 : For Information Security
Call Number: 004.068 Cob | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
1
2
3
4
5
6
7
8
9
10
Next