Your search for 28020 returns 8614 document(s) |
Information security management handbook 4th ed./ editor Harold F. Tiptop |
Call Number: 658.055 8 Inf | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptography and network security: principles and practice 3rd ed. |
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer project management |
Author: Bentley, Colin; | Call Number: 658.404 Ben c | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Soft systems thinking methodology and the management of change |
Author: Wilson, Brian; | Call Number: 658. 406 Wil s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Robotics in pratice: management and applications of industrial robots/ Joseph F. Engelberger |
Author: Engelberger, Joseph; | Call Number: 629.892 Eng r | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information hiding techniques for steganography and digital watermarking/ Stefan Katzenbeisser |
Call Number: 005.8 Inf | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Business portfolio management: tuntunan terbaik tentang berbagai strategi terapan bagi pengelolaan unit bisnis dan portfolio bisnis |
Author: Allen, Michael S.; | Call Number: 658 All b | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer security risk analysis and control a guide for the dp manager |
Author: Wong, KK; | Call Number: 658.47 Won r | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer network |
Author: Black, Uyles D.; | Call Number: 004.6 Bla c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Trojans, Worms, and spyware: a computer security professional's guide to malicious code |
Author: Erbschloe, Michael; | Call Number: 005.84 Erb t | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|