Search Result
Save to File
Your search for
38148
returns
5409
document(s)
Business continuity planning for data centers and systems
Author: Bowman, Ronald H.; | Call Number: 658.478 Bow b | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Cryptography and Data Security
Author: Denning, Dorothy E.; | Call Number: 005.8 Den c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Assessing and managing security risk in it systems: a structured methodology/ John Mccumber
Author: Mccumber, John; | Call Number: 005.8 Mcc a | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Data authentication protocol modeling on multilayer data hiding for multilayer protocol hiding. hal, 112
Author: Christian Gustav; | Call Number: SEM-317 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Principles of data security/ Ernst L. Leiss
Author: Leiss, Ernst L.; | Call Number: 05.8 Lei p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Building a global information assurance program/ Raymond J. Curts
Author: Curts, Raymond J.; | Call Number: 005.8 Cur b | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Security metrics: a beginner's guide
Author: Wong, Caroline S.; | Call Number: 005.8 Won s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Information assurance for the enterprise: a roadmap to information security/ Corey Schou
Author: Schou, Corey; | Call Number: 005.8 Sch c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Information security management : Concepts and Practice
Author: Raggad, Bel G.; | Call Number: 005.8 Rag i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Online law: the spa's legal guide to doing business on the internet/ Thomas J. Smidinghoff editor
Call Number: 343.730 9 Onl | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev 1
2
3
4
5
6
7
8
9
10
Next