Search Result Save to File Save as CSV
Your search for 35754 returns 4329 document(s)
Security risk management building an information security risk management program from the ground up
Call Number: 005.8 Whe s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Linux System Security: An administrator's guide to Open Source Security Tools/ Scott Mann and Ellen L. Mitchell
Author: Mann, Scott; | Call Number: 005.43 Man l | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Evaluasi Security Operations Dan Perancangan Security Operations Center : Studi Kasus PT XYZ
Author: Ari Ahmad Syarif; | Call Number: KA-1213 (Softcopi KA-1206) MAK KA-859 | Edition: 2019 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Internet security made easy: a plain english guide to protecting yourself and your company online/Douglas Schwitzer
Author: Schweitzer, Douglas; | Call Number: 005.8 Sch i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Data mining and analysis: fundamentals concepts and algorithms
Author: Zaki, Mohammed J.; | Call Number: 006.3 Zak d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography and Network security principles and practice 4th ed. (INSTRUCTOR'S MANUAL)
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Instructor's Manual
Find Similar |  Add To Favorites |  Detail in New Window 
Network security in the'90s :issues and solutions for managers/Thomas W. Madron
Author: Madron, Thomas William; | Call Number: 005.8 Mad n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Pemodelan Credit Scoring untuk Kredit UMKM dengan Menggunakan Metode Klasifikasi Data Mining: Studi Kasus PT Pegadaian (Persero)
Author: Wike Ulfiani Aresa; | Call Number: KA-1351 (Softcopi KA-1344) MAK KA-995 | Edition: 2020 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Implementasi Pemrograman Java Untuk Alert Instrucsion Detection System
Author: Fadhila Nisya Tanjung, Muhammad Irwan Padli Nasution; | Call Number: SEM-342 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Introduction to health information privacy and security
Author: Rinehart-Thompson, Laurie A.; | Call Number: 610.68 Rin i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   7 8 9 10 11 12 13 14 15 16  Next