Your search for 31025 returns 5379 document(s) |
Principles of data security/ Ernst L. Leiss |
Author: Leiss, Ernst L.; | Call Number: 05.8 Lei p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
IT auditing : using controls to protect iformation assets 2nd ed |
Author: Davis, Chris; | Call Number: 658.05 Dav i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Internet cryptography |
Author: Smith, Richard E.; | Call Number: 005.82 Smi i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Insiders’ Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors, page 1189-1210 |
Author: Clay Posey, Tom L. Roberts, Paul Benjamin Lowry, Rebecca J. Bennett, and James F. Courtney | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Kajian keamanan aplikasi WEB berbasis Microsoft ASP.NET berdasarkan Microsoft .NET Framework Security |
Author: Budiman Ranamanggala; | Call Number: PA-0031 (Softcopy PA-0031) | Edition: 2005 | Type: Proyek Akhir (PA)
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Iformation security risk management planning: a case study at application module of state asset directorate general of state asset ministry of finance |
Author: Sigit Prasetyo; Yudho Giri Sucahyo; | Call Number: sem-320 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Data protection in health information systems considerations and guidelines/ edited by G.G.Griesser |
Call Number: 651.504 261 Dat | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
CISSP Certification: exam guide all in one, 4th ed ; |
Author: Harris , Shon; | Call Number: 005.8 Har c; | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Implementing elliptic curve cryptography/Michael Rosing |
Author: Rosing, Michael; | Call Number: 005.82 Ros i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Built-in security feature of sensor network, HAL. 440 - 447 |
Author: Kalpana Sharma; Vikash Varum; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|