Search Result
Save to File
Your search for
42956
returns
6735
document(s)
IT auditing : using controls to protect iformation assets 2nd ed
Author: Davis, Chris; | Call Number: 658.05 Dav i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Data structures: theory& practice 2nd ed. (second edition)
Author: Berztiess, A.T.; | Call Number: 005.73 Ber d | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Data structures: theory and practice 2nd ed. (second edition)
Author: Berztiss, A.T.; | Call Number: 005.73 Bar d | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Certified information security management (CISM Review Manual 2013)
Call Number: 658.478 Cer | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Certified information security management (Cism Review Manual 2015)
Call Number: 658.478 Cer | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Information hiding techniques for steganography and digital watermarking/ Stefan Katzenbeisser
Call Number: 005.8 Inf | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Certified information security management (CISM Review Manual 2011)
Call Number: 658.478 Cer | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Information security management handbook 4th ed./ editor Harold F. Tiptop
Call Number: 658.055 8 Inf | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Information security risk analysis/Thomas R.
Author: Poltier, Thomas R.; | Call Number: 005.8 Pel i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Fundamentals of game design 2nd ed.
Author: Adams, Ernest; | Call Number: 794.8 Ada f | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
2
3
4
5
6
7
8
9
10
11
Next