Search Result Save to File Save as CSV
Your search for 28020 returns 8614 document(s)
Information security management handbook 4th ed./ editor Harold F. Tiptop
Call Number: 658.055 8 Inf | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography and network security: principles and practice 3rd ed.
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Computer project management
Author: Bentley, Colin; | Call Number: 658.404 Ben c | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Soft systems thinking methodology and the management of change
Author: Wilson, Brian; | Call Number: 658. 406 Wil s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Robotics in pratice: management and applications of industrial robots/ Joseph F. Engelberger
Author: Engelberger, Joseph; | Call Number: 629.892 Eng r | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information hiding techniques for steganography and digital watermarking/ Stefan Katzenbeisser
Call Number: 005.8 Inf | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Business portfolio management: tuntunan terbaik tentang berbagai strategi terapan bagi pengelolaan unit bisnis dan portfolio bisnis
Author: Allen, Michael S.; | Call Number: 658 All b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security risk analysis and control a guide for the dp manager
Author: Wong, KK; | Call Number: 658.47 Won r | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer network
Author: Black, Uyles D.; | Call Number: 004.6 Bla c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Trojans, Worms, and spyware: a computer security professional's guide to malicious code
Author: Erbschloe, Michael; | Call Number: 005.84 Erb t | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   4 5 6 7 8 9 10 11 12 13  Next