Search Result Save to File Save as CSV
Your search for 31025 returns 5379 document(s)
Principles of data security/ Ernst L. Leiss
Author: Leiss, Ernst L.; | Call Number: 05.8 Lei p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
IT auditing : using controls to protect iformation assets 2nd ed
Author: Davis, Chris; | Call Number: 658.05 Dav i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Internet cryptography
Author: Smith, Richard E.; | Call Number: 005.82 Smi i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Insiders’ Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors, page 1189-1210
Author: Clay Posey, Tom L. Roberts, Paul Benjamin Lowry, Rebecca J. Bennett, and James F. Courtney | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Kajian keamanan aplikasi WEB berbasis Microsoft ASP.NET berdasarkan Microsoft .NET Framework Security
Author: Budiman Ranamanggala; | Call Number: PA-0031 (Softcopy PA-0031) | Edition: 2005 | Type: Proyek Akhir (PA)
Find Similar |  Add To Favorites |  Detail in New Window 
Iformation security risk management planning: a case study at application module of state asset directorate general of state asset ministry of finance
Author: Sigit Prasetyo; Yudho Giri Sucahyo; | Call Number: sem-320 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Data protection in health information systems considerations and guidelines/ edited by G.G.Griesser
Call Number: 651.504 261 Dat | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
CISSP Certification: exam guide all in one, 4th ed ;
Author: Harris , Shon; | Call Number: 005.8 Har c; | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Implementing elliptic curve cryptography/Michael Rosing
Author: Rosing, Michael; | Call Number: 005.82 Ros i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Built-in security feature of sensor network, HAL. 440 - 447
Author: Kalpana Sharma; Vikash Varum; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   14 15 16 17 18 19 20 21 22 23  Next