Search Result
Save to File
Your search for
29531
returns
3754
document(s)
Information assurance for the enterprise: a roadmap to information security/ Corey Schou
Author: Schou, Corey; | Call Number: 005.8 Sch c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Designing database applications with objects and rules: the idea methodology
Author: Ceri, Stefano; | Call Number: 005.74 Cer d | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
A Practical guide to security assessments/ Sudhanshu Kairab
Author: Kairab, Sudhanshu; | Call Number: 658.478 Kai p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Advances in computer security management/Editor Thomas A. Rullo
Call Number: 658.478 Adv | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Risk management for computer security: protecting your network and information assets
Author: Jones, Andy; | Call Number: 658.478 Jon r | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Database Computers/ Olin H. Bray; Harvey A. Freeman
Author: Bray, Olin H.; | Call Number: 005.74 Bra d | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Data security through graphical authentication schemes, HAL. 1013-1024
Author: M.N. Djoja; Naveen Kumar; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
File techniques for database organization in COBOL
Author: "Johnson, Leroy F."; | Call Number: 005.133 Joh f | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
CISSP: Cedrtified information systems security professional syudy guide 7th ed.
Author: Stewart, James Michael; | Call Number: 005.8 Ste c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer security risk analysis and control a guide for the dp manager
Author: Wong, KK; | Call Number: 658.47 Won r | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
16
17
18
19
20
21
22
23
24
25
Next