Search Result Save to File Save as CSV
Your search for 28020 returns 8614 document(s)
Unix system security: a guide for users and systems administratiors
Author: Curry, David A.; | Call Number: 005.43 Cur u | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Strategi manajemen perubahan untuk mendukung implementasi information security management system : studi kasus Bank XYZ Divisi Teknologi Informasi
Author: Farida Noorseptiyanti; | Call Number: KA-218 (Softcopy KA-217) | Edition: 2011 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
SNMP: a guide to network management/ Sidnie Feit
Author: Feit, Sidnie; | Call Number: 004.62 Fei s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Tutorial: Local computer network 2nd ed.
Author: Thurber, Kenneth J.; | Call Number: 004.6 Thu t | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Information security an integrated collection of essaysl
Call Number: 005.8 Inf | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Online resources for business: getting the information your busniess needs to stay competitive/Alfred Glossbrenner
Author: Glossbrenner, Alfred; | Call Number: 658.403 8 Glo o | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Perencanaan tata kelola keamanan informasi berdasarkan information security management system (ISMS) ISO 27001 studi kasus Pusat Komunikasi Departemen Luar Negeri RI
Author: Eko Ariefianto; | Call Number: PA-0086 (Softcopy PA-0086) | Edition: 2006 | Type: Proyek Akhir (PA)
Find Similar |  Add To Favorites |  Detail in New Window 
Inside network perimeter security: the definitve guide to firewalls, VPNs, routers, and instruction Detection
Author: Northcutt, Stephen...[et. al.]; | Call Number: 005.8 Ins | Edition: 2003 | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Applied cryptography and network security : first internal conference ACNS 2003, Kunnings, China, October 16-19, 2003, Proceedings
Author: Zhou, Jianjing; | Call Number: 005.8 Zho o | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Maximizing the enterprise information assets/ Timothy D. Wells
Author: Wells, Timothy D.; | Call Number: 658.403 8 Wel m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   11 12 13 14 15 16 17 18 19 20  Next