Search Result Save to File Save as CSV
Your search for 29667 returns 4734 document(s)
The Togaf standard version 9.2
Call Number: 658.4 Tog | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The Togaf standard version 9.2: a pocket guide
Call Number: 658.4 Tog | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Central systems architecture: planning and controlling complex IBM computing centres/ Tore A. Hoie
Author: Hoie, Tore A.; | Call Number: 621.392 Hoi C | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Securing e-busniess applications and communications/ Jonathan S. Held
Author: Held, Jonathan S.; | Call Number: 658.84 Hel s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Building a global information assurance program/ Raymond J. Curts
Author: Curts, Raymond J.; | Call Number: 005.8 Cur b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The Basics of hacking and penetration testing: ethical hacking and penetration testing made easy 2nd ed.
Author: Engebretson, Patrick; | Call Number: 005.8 Eng b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography and computational number theory
Call Number: 005.8 Cry | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Implementing the ISO/IEC 27001 ISMS standard 2nd ed.
Author: Humphreys, Edward; | Call Number: 005.8 Hum i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Practical firewalls/Terry William Ogletree
Author: Ogletree, Terry William; | Call Number: 005.8 Ogl p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Building internet firewalls 2nd ed.
Author: Zwicky, Elizabeth D.; | Call Number: 005.8 Zwi b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   14 15 16 17 18 19 20 21 22 23  Next