Your search for 29667 returns 4773 document(s) |
Enterprise security architecture: a business-driven approach |
Author: Sherwood, John; | Call Number: 005.8 She e | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information security architecture: an integrated approach to security in the organization 2nd ed. |
Author: Killmeyer, Jan; | Call Number: 005.8 Kil i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer security |
Author: editors Virginia, Alexandria; | Call Number: 005.8 Com | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer security |
Author: Golddmann, Dieter; | Call Number: 005.8 Gol c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security in computing |
Author: Pfleeger, Charles P.; | Call Number: 005.8 Pfl s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
E-Commerce security strategies: protecting the enterprise |
Author: Cameron, Debra; | Call Number: 658.478 Cam e | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information assurance for the enterprise: a roadmap to information security/ Corey Schou |
Author: Schou, Corey; | Call Number: 005.8 Sch c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer architecture a quantitative approach |
Author: Patterson, David A.; | Call Number: 004.22 Pat c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Protection and security on the information superhighway |
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Designing security architecture solution |
Author: Ramachandran, Jay; | Call Number: 005.8 Ram d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|