Search Result Save to File Save as CSV
Your search for 40314 returns 3334 document(s)
An Introduction to information theory
Author: Reza, Fazlollah M.; | Call Number: 003.54 Rez i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Unix system security: a guide for users and systems administratiors
Author: Curry, David A.; | Call Number: 005.43 Cur u | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Evaluasi kinerja sistem manajemen keamanan informasi menggunakan ISO 17799: studi kasus Departemen Pertanian RI
Author: Danan Mursito; | Call Number: PA-0145 (Softcopy PA-0145) | Edition: 2008 | Type: Proyek Akhir (PA)
Find Similar |  Add To Favorites |  Detail in New Window 
Analisis hubungan kendali keamanan sanksi yang dirasakan, dan kepercayaan moral terhadap intensi penyalahgunaan aplikasi mobile oleh pengendara ojek online
Author: Muhammad Teguh Brillian; | Call Number: KA-1110 (Softcopi KA-1104) MAK KA-756 | Edition: 2018 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Principles of data security/ Ernst L. Leiss
Author: Leiss, Ernst L.; | Call Number: 05.8 Lei p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
PRONTCRM: A FRAMEWORK BASED ON THEORY OF CRM PENERAPNNYA PADA TOKO BUKU BERSKALA UKM (149-158)
Author: Eko K. Budiarjo, Wira perdana; | Call Number: SEM-309 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
PRONTCRM: A FRAMEWORK BASED ON THEORY OF CRM PENERAPNNYA PADA TOKO BUKU BERSKALA UKM (149-158)
Author: Eko K. Budiarjo, Wira perdana; | Call Number: SEM-309 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Being digital
Author: Negroponte, Nicholas; | Call Number: 303.883 Neg b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer/ D.W. Davies
Author: Davies, Donald Watts; | Call Number: 384 Dav s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Survey of vulnerability and security of mobile ad hoc networks
Author: Siddharth S Rautaray and Sanjeev Sharma; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   13 14 15 16 17 18 19 20 21 22  Next