Search Result Save to File Save as CSV
Your search for 35931 returns 4411 document(s)
ACCESS 2000: The complete reference
Author: Andersen, Virginia; | Call Number: 005.43 And a | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
ASP/MTS/ADSI web security
Author: Harrison, Richard; | Call Number: 005.86 Har a | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
ASP/MTS/ADSI web security
Author: Harrison, Richard; | Call Number: 005.86 Har a | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Web security: a step-by step reference guide/Lincon D. Stein
Author: Stein, Lincoln D.; | Call Number: 005.8 Ste w | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
A survey on low-cost RFID authentication protocols, hal. 81-86
Author: Irfan Syamsuddin, Song Han, Tharam Dillon; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan kebijakan keamanan informasi pada perusahaan jasa Layanan Kurir: studi kasus PT. NCS
Author: Junian Dani,; | Call Number: T-0740 (Softcopy T-0395) | Edition: 2008 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Managing information security: a program for the electronic information age
Author: Schweitzer, James A.; | Call Number: 658.478 Sch m | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Managing information security: a program for the electronic information age/ James A. Schweitzer
Author: Schweitzer, James A.; | Call Number: 658.478 Sch m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security management/ Donn B. Parker
Author: Parker, Donn B.; | Call Number: 658.478 Par c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Penyimpanan stabil
Author: Syukri Yunus; | Call Number: T-0015 | Edition: 1991 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next