Search Result
Save to File
Your search for
38620
returns
3925
document(s)
Introduction to health information privacy and security
Author: Rinehart-Thompson, Laurie A.; | Call Number: 610.68 Rin i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Database security and integrity/ Eduardo B. Fernandez
Author: Fernandez, Eduardo B.; | Call Number: 005.74 Fer d | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Information security an integrated collection of essaysl
Call Number: 005.8 Inf | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Principles of data security/ Ernst L. Leiss
Author: Leiss, Ernst L.; | Call Number: 05.8 Lei p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Information warfare and security/Dorothy E. Denning
Author: Denning, Dorothy E.R.; | Call Number: 355.343 Den i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer security management/ Donn B. Parker
Author: Parker, Donn B.; | Call Number: 658.478 Par c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Privacy, security, and the information processing industry
Call Number: SEM-097 | Type: Prosiding Seminar
Find Similar
|
Add To Favorites
|
Detail in New Window
Konfigurasi Security Policy Selinux (130-133)
Author: Jaki Eko Istiyanto Nurhayati Masthurah; | Call Number: SEM-337 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Infrastructural Map for Information Security (503-512)
Author: Sabah Al-Fedaghi Hanaa Alnashwan; | Call Number: SEM-323 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
National security versus data privacy and security: study of personal data privacy and security in Iran, HAL. 1081-1087
Author: Hassan Allpour and Ebrahim Kiani Harchegant; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
14
15
16
17
18
19
20
21
22
23
Next