Search Result
Save to File
Your search for
40314
returns
3287
document(s)
E-Commerce security strategies: protecting the enterprise
Author: Cameron, Debra; | Call Number: 658.478 Cam e | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Cryptography and computational number theory
Call Number: 005.8 Cry | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Data dictionaries and administration: concepts and practices for data resources management
Author: Ross, Ronald G.; | Call Number: 658.403 8 Ros d | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Secrets and Lies: Digital security in a Networked world whith new information about post 9/11 security
Author: Schneier, I Bruce; | Call Number: 005.8 Sch s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Microsoft windows security resource kit
Author: Smith, Ben; | Call Number: 005.8 Smi m | Type: Softcopy Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Microsoft windows security resource kit
Author: Smith, Ben; | Call Number: 005.8 Smi m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
E-learning in the 21st century: a community of inquiry framework for research and practice 3rd ed.
Author: Garrison, Randy D.; | Call Number: 378.1 Gar e | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Network security: data and voice communications/Fred Simonds
Author: Simonds, Fred; | Call Number: 005.8 Sim n | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Network and internet work security: principles and practice
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Enterprise resources planning and beyond: integrating your entire organization
Author: Langen Walter, Gary A.; | Call Number: 658.8 Lan e | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
9
10
11
12
13
14
15
16
17
18
Next