Your search for 31025 returns 5379 document(s) |
Certified information security management (CISM Review Manual 2013) |
Call Number: 658.478 Cer | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Certified information security management (Cism Review Manual 2015) |
Call Number: 658.478 Cer | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Certified information security management (CISM Review Manual 2011) |
Call Number: 658.478 Cer | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Unix system security: a guide for users and systems administratiors |
Author: Curry, David A.; | Call Number: 005.43 Cur u | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied cryptography and network security: first international conf. ACNS 2003 Kunning, China, October 16-19, 2003 Proceedings |
Author: Zhou, Jianying; | Call Number: 005.8 Zho a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Maximum Linux security : [a hacker's guide to protecting your Linux server and workstation]/ Anonymous |
Author: Ray, John; | Call Number: 005.8 Ray m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Internet security made easy: a plain english guide to protecting yourself and your company online/Douglas Schwitzer |
Author: Schweitzer, Douglas; | Call Number: 005.8 Sch i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Building a global information assurance program/ Raymond J. Curts |
Author: Curts, Raymond J.; | Call Number: 005.8 Cur b | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Techniques and applications of digital watermarking and content protection |
Author: Arnold, Michael; | Call Number: 005.8 Arn t | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
E-Commerce security strategies: protecting the enterprise |
Author: Cameron, Debra; | Call Number: 658.478 Cam e | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|