Search Result
Save to File
Your search for
28020
returns
8614
document(s)
Information security management: implementation and global standard (ISO-2700)
Author: Jivika Govil; Jivesh Govil; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Applied cryptography: protocols, algorithms and source code in C
Author: Schneier, Bruce; | Call Number: 005.82 Sch a | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Iformation security risk management planning: a case study at application module of state asset directorate general of state asset ministry of finance
Author: Sigit Prasetyo; Yudho Giri Sucahyo; | Call Number: sem-320 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Enterprise security architecture: a business-driven approach
Author: Sherwood, John; | Call Number: 005.8 She e | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Perancangan kerangka kerja network security operator center: studi kasus Kementerian Luar Negeri
Author: Fitri Wijayanti; | Call Number: KA-1457 (Softcopy KA-1445) MAK KA-1097 | Edition: 2021 | Type: Karya Akhir (KA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Build your own z-80 computer design guidelines and application notes
Author: Ciarcia, Steve; | Call Number: 621.29 Cia b | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Compuer town: bringing computer literacy to your community/ Liza Loop
Author: Loop, Liza; | Call Number: 004 Loo c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Principles and practice of information secuirty: protecting computers from Hackers and lawyers/ Linda Volonino
Author: Volonino, Linda; | Call Number: 005.8 Vol p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Local computer network technologies/ Carl Tropper
Author: Tropper, Carl; | Call Number: 621.381 Tro l | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Communications control in computer network/ Josef Puzman
Author: Puzman, Josef; | Call Number: 004.6 Puz c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
8
9
10
11
12
13
14
15
16
17
Next