Search Result
Save to File
Your search for
35754
returns
4329
document(s)
Information security management handbook 4th ed./ editor Harold F. Tiptop
Call Number: 658.055 8 Inf | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Studi perencanaan manajemen proteksi keamanan internet banking
Author: Alfian Noor; | Call Number: PA-0029 (Softcopy PA-0029 | Edition: 2005 | Type: Proyek Akhir (PA)
Find Similar
|
Add To Favorites
|
Detail in New Window
Intrustion detection system using neural networks, HAL. 787-798
Author: Adel Jahanbani; M. Keshtgari; and AMi; H. M Monadjemi; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
DNS security management
Author: Dooley, Michael; | Call Number: 005.8 Doo d | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Professional web services security
Call Number: 005.8 Pro | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Neural networks: algorithms, applications, and programming techniques/James A. Freeman
Author: Freeman, James A.; | Call Number: 006.3 Fre n | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Data mining: concepts and techniques 3rd ed.
Author: Han, Jiawei; | Call Number: 006.3 Han d | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Data mining: concepts and techniques 2nd ed.
Author: Han, Jiawei; | Call Number: 006.3 Han d | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Principles of data security/ Ernst L. Leiss
Author: Leiss, Ernst L.; | Call Number: 05.8 Lei p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Principles of information security 3rd ed.
Author: Whitman, Michael E.; | Call Number: 005.8 Whi p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
5
6
7
8
9
10
11
12
13
14
Next