Search Result
Save to File
Your search for
40586
returns
7364
document(s)
Readings and cases in the management of information security
Author: Whitman, Michael E.; | Call Number: 005.8 Whi r | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Building internet firewalls
Author: Zwicky, Elizabeth D.; | Call Number: 005.8 Zwi b | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Network security: how to plan for it and achive it
Author: Baker, Richard H.; | Call Number: 658.478 Bak n | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Securing e-busniess applications and communications/ Jonathan S. Held
Author: Held, Jonathan S.; | Call Number: 658.84 Hel s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Electronic commerce relationships: trust by design/Peter Keen
Call Number: 005.8 Ele | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Auditor's guide to information system auditing
Author: Cascarino, Richard E.; | Call Number: 658.055 8 Cas a | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Auditing information systems: enhancing performance of the enterprise
Author: Nyirongo, Abraham; | Call Number: 658 Nyi a | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
EDP auditing/Ron Weber
Author: Weber, Ron; | Call Number: 657.453 Web e | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Auditing information systems: a comprehensive reference guide/Jack Champlain
Author: Champlain, Jack; | Call Number: 658.5 Cha a | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Cryptography and Network security principles and practice 2nd ed.
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
1
2
3
4
5
6
7
8
9
10
Next