Search Result Save to File Save as CSV
Your search for 35754 returns 4329 document(s)
Information security management handbook 4th ed./ editor Harold F. Tiptop
Call Number: 658.055 8 Inf | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Studi perencanaan manajemen proteksi keamanan internet banking
Author: Alfian Noor; | Call Number: PA-0029 (Softcopy PA-0029 | Edition: 2005 | Type: Proyek Akhir (PA)
Find Similar |  Add To Favorites |  Detail in New Window 
Intrustion detection system using neural networks, HAL. 787-798
Author: Adel Jahanbani; M. Keshtgari; and AMi; H. M Monadjemi; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
DNS security management
Author: Dooley, Michael; | Call Number: 005.8 Doo d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Professional web services security
Call Number: 005.8 Pro | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Neural networks: algorithms, applications, and programming techniques/James A. Freeman
Author: Freeman, James A.; | Call Number: 006.3 Fre n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Data mining: concepts and techniques 3rd ed.
Author: Han, Jiawei; | Call Number: 006.3 Han d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Data mining: concepts and techniques 2nd ed.
Author: Han, Jiawei; | Call Number: 006.3 Han d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Principles of data security/ Ernst L. Leiss
Author: Leiss, Ernst L.; | Call Number: 05.8 Lei p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Principles of information security 3rd ed.
Author: Whitman, Michael E.; | Call Number: 005.8 Whi p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   5 6 7 8 9 10 11 12 13 14  Next