Search Result Save to File Save as CSV
Your search for 26203 returns 3849 document(s)
Cybersecurity ( Knowledge sharing series issue 2)
Author: Youm, Heung Youl; | Call Number: 658.4 You c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
COBIT 5 : Process assessment model (PAM): using cobit 5
Call Number: 004.068 Cob | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
COBIT 5 : Self-assessment guide: using cobit 5
Call Number: 004.068 Cob | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
COBIT 5 : Enabling processes
Call Number: 004.068 Cob | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Strategies for information technology governance/ Wim Van Grembergen editor
Author: Wim Van Grembergen; | Call Number: 658.403 8 Wim s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Administering data centers: server, storage, and voice over IP
Author: Jayaswal, Kailash; | Call Number: 004.068 Jay a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
COBIT 5 : For Risk
Call Number: 004.068 Cob | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
COBIT 5 : Implementation
Call Number: 004.068 Cob | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
COBIT 5 : For Assurance
Call Number: 004.068 Cob | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
COBIT 5 : For Information Security
Call Number: 004.068 Cob | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next