Search Result Save to File Save as CSV
Your search for 40314 returns 3287 document(s)
E-Commerce security strategies: protecting the enterprise
Author: Cameron, Debra; | Call Number: 658.478 Cam e | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography and computational number theory
Call Number: 005.8 Cry | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Data dictionaries and administration: concepts and practices for data resources management
Author: Ross, Ronald G.; | Call Number: 658.403 8 Ros d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Secrets and Lies: Digital security in a Networked world whith new information about post 9/11 security
Author: Schneier, I Bruce; | Call Number: 005.8 Sch s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Microsoft windows security resource kit
Author: Smith, Ben; | Call Number: 005.8 Smi m | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Microsoft windows security resource kit
Author: Smith, Ben; | Call Number: 005.8 Smi m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
E-learning in the 21st century: a community of inquiry framework for research and practice 3rd ed.
Author: Garrison, Randy D.; | Call Number: 378.1 Gar e | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Network security: data and voice communications/Fred Simonds
Author: Simonds, Fred; | Call Number: 005.8 Sim n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Network and internet work security: principles and practice
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Enterprise resources planning and beyond: integrating your entire organization
Author: Langen Walter, Gary A.; | Call Number: 658.8 Lan e | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   9 10 11 12 13 14 15 16 17 18  Next