Search Result
Save to File
Your search for
38620
returns
3935
document(s)
Evaluasi infrastruktur keamanan jaringan retail internet banking: studi kasus di PT Bank XYZ Tbk.
Author: Ikrar Adinata Arin; | Call Number: T-0853 (Softcopy T-0507) | Edition: 2009 | Type: Tesis
Find Similar
|
Add To Favorites
|
Detail in New Window
Penjabaran Teknis dari Kebijakan Keamanan Jaringan Enterprise
Author: Niken Dwi Wahyu Cahyani; | Call Number: T-0478 (Softcopy Scan T-0033) | Edition: 2004 | Type: Tesis
Find Similar
|
Add To Favorites
|
Detail in New Window
Using the common criteria for it security evaluation/ Debra S. Hermann
Author: Hermann, Debra S.; | Call Number: 005.8 Her s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Advances in computer security management/Editor Thomas A. Rullo
Call Number: 658.478 Adv | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Smart card security and applications/Mike Hendry
Author: Hendry, Mike; | Call Number: 006 Hen s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Theory frame of water resources security monitoring, Hal. 3737-3741
Author: Mingqi Chang; Lei Xu; Yue Wang; Shaohua Lu; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer/ D.W. Davies
Author: Davies, Donald Watts; | Call Number: 384 Dav s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer security
Author: editors Virginia, Alexandria; | Call Number: 005.8 Com | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer security
Author: Golddmann, Dieter; | Call Number: 005.8 Gol c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Security in computing
Author: Pfleeger, Charles P.; | Call Number: 005.8 Pfl s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
2
3
4
5
6
7
8
9
10
11
Next