Search Result Save to File Save as CSV
Your search for 27889 returns 3695 document(s)
Cryptography and Data Security
Author: Denning, Dorothy E.; | Call Number: 005.8 Den c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
IT Audit, control, and security
Author: Moeller, Robert R.; | Call Number: 658.4 Moe i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security : art and science
Author: Bishop, Matt; | Call Number: 005.8 Bis c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Physical security for IT/ Michael Erbschloe
Author: Erbschloe, Michael; | Call Number: 005.8 Erb p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Database security/Silvano Castano
Call Number: 005.8 Dat | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Professional web services security
Call Number: 005.8 Pro | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Corporate computer and network security
Author: Panko, Raymond; | Call Number: 005.8 Pan c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information security architecture: an integrated approach to security in the organization 2nd ed.
Author: Killmeyer, Jan; | Call Number: 005.8 Kil i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Memahami modul enkripsi dan security data/
Call Number: 005.8 Mem (MTI SLB) | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Watermark-based Copyright System Security
Author: Sai Ho Kwok | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   4 5 6 7 8 9 10 11 12 13  Next