Search Result
Save to File
Your search for
31152
returns
7445
document(s)
Outsourcing information security/ C. Warren Axelrod
Author: Axelrod C. Warren; | Call Number: 005.8 Axe o | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Roadmap to information security: for it and infosec managers
Author: Whitman, Michael E.; | Call Number: 005.8 Whi r | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Corporate computer security 4th ed.
Author: Boyle, Randall J.; | Call Number: 005.8 Boy c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Smart card security and applications/Mike Hendry
Author: Hendry, Mike; | Call Number: 006 Hen s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
The Architecture of Computer Hardware and Systems Software : An Information Technology Approach 2nd ed/ Irv Englander
Author: Englander, Irv; | Call Number: 004.22 Eng c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer network 2nd ed.
Author: Tanenbaum, Andrew S.; | Call Number: 004.36 Tan c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer graphics 2nd ed.
Author: Hearn, Donald; | Call Number: 006.6 Hea c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer organization 2nd ed.
Author: Hamacher, V. Carl; | Call Number: 004.22 Ham c | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Data networks 2nd ed.
Author: Bertsekas, Dimitris; | Call Number: 004.6 Ber d | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer organization 2nd ed.
Author: Hamacher, V. Carl; | Call Number: 004.22 Ham c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
3
4
5
6
7
8
9
10
11
12
Next