Your search for 29610 returns 3897 document(s) |
Foiling the system breakers: computer security and access control/ Jerome Lobel |
Author: Lobel, Jerome; | Call Number: 005.8 Lob f | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer security risk management/ I.C. Palmer; G.A. Potter |
Author: Palmer, I.C.; | Call Number: 005.8 Pal c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Trojans, Worms, and spyware: a computer security professional's guide to malicious code |
Author: Erbschloe, Michael; | Call Number: 005.84 Erb t | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Risk management for computer security: protecting your network and information assets |
Author: Jones, Andy; | Call Number: 658.478 Jon r | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer security risk analysis and control a guide for the dp manager |
Author: Wong, KK; | Call Number: 658.47 Won r | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
STUDI KONSEP PENERAPAN COMPUTER SECURITY PENGARUHNYA TERHADAP KENYAMANAN PENGGUNA |
Author: Rita Rijayanti, ST; | Call Number: SEM-361 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The people side of systems: human aspects of computer systems |
Author: London, Keith R.; | Call Number: 004 Lon p | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Interneworking computer systems: interconnecting networking and systems |
Author: Mcconnell, John; | Call Number: 004.6 McC i | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The design of operating systems for small computer systems |
Author: Kaisler, Stephen H.; | Call Number: 003 Kai d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Bias in computer systems, page 330 |
Author: Batya F. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|