Your search for 3894 returns 6932 document(s) |
Network security principles and practices: expert solutions for securing network infrastructures and VPNs/ Saadat Malik |
Author: Malik Saadat; | Call Number: 005. 8 Mal n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Applied cryptography and network security: first international conf. ACNS 2003 Kunning, China, October 16-19, 2003 Proceedings |
Author: Zhou, Jianying; | Call Number: 005.8 Zho a | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Adaptive routing algorithms in unstructured Peer-To-Peer (P2P) systems |
Author: Achmad Nizar Hidayanto; | Call Number: DIS-015 (Softcopy DIS-007) | Type: Disertasi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Principles of software engineering management |
Author: Gilb, Tom; | Call Number: 005.1 Gil p | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Developing a records management programme |
Author: Hare, Catherine E; | Call Number: 658.403 Har d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Practitioner's guide to product management |
Author: Busuttil, Jock; | Call Number: 658.5 Bus p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security risk management building an information security risk management program from the ground up |
Call Number: 005.8 Whe s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Software project management 4th ed. |
Author: Hughes, Bob; | Call Number: 005.106 8 Hug s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Management methodology for softawre product engineering |
Author: Gunther, Richard C.; | Call Number: 658.05 Gun m | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Management methodology for software product engineering |
Author: Gunther, Richard; | Call Number: 658.05 Gun m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|