Search Result Save to File Save as CSV
Your search for 31152 returns 7445 document(s)
Outsourcing information security/ C. Warren Axelrod
Author: Axelrod C. Warren; | Call Number: 005.8 Axe o | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Roadmap to information security: for it and infosec managers
Author: Whitman, Michael E.; | Call Number: 005.8 Whi r | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Corporate computer security 4th ed.
Author: Boyle, Randall J.; | Call Number: 005.8 Boy c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Smart card security and applications/Mike Hendry
Author: Hendry, Mike; | Call Number: 006 Hen s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
The Architecture of Computer Hardware and Systems Software : An Information Technology Approach 2nd ed/ Irv Englander
Author: Englander, Irv; | Call Number: 004.22 Eng c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer network 2nd ed.
Author: Tanenbaum, Andrew S.; | Call Number: 004.36 Tan c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer graphics 2nd ed.
Author: Hearn, Donald; | Call Number: 006.6 Hea c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer organization 2nd ed.
Author: Hamacher, V. Carl; | Call Number: 004.22 Ham c | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Data networks 2nd ed.
Author: Bertsekas, Dimitris; | Call Number: 004.6 Ber d | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Computer organization 2nd ed.
Author: Hamacher, V. Carl; | Call Number: 004.22 Ham c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   3 4 5 6 7 8 9 10 11 12  Next