Search Result Save to File Save as CSV
Your search for 29667 returns 4773 document(s)
Enterprise security architecture: a business-driven approach
Author: Sherwood, John; | Call Number: 005.8 She e | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information security architecture: an integrated approach to security in the organization 2nd ed.
Author: Killmeyer, Jan; | Call Number: 005.8 Kil i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security
Author: editors Virginia, Alexandria; | Call Number: 005.8 Com | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security
Author: Golddmann, Dieter; | Call Number: 005.8 Gol c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Security in computing
Author: Pfleeger, Charles P.; | Call Number: 005.8 Pfl s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
E-Commerce security strategies: protecting the enterprise
Author: Cameron, Debra; | Call Number: 658.478 Cam e | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information assurance for the enterprise: a roadmap to information security/ Corey Schou
Author: Schou, Corey; | Call Number: 005.8 Sch c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer architecture a quantitative approach
Author: Patterson, David A.; | Call Number: 004.22 Pat c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Protection and security on the information superhighway
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Designing security architecture solution
Author: Ramachandran, Jay; | Call Number: 005.8 Ram d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next