Search Result Save to File Save as CSV
Your search for 42956 returns 6735 document(s)
IT auditing : using controls to protect iformation assets 2nd ed
Author: Davis, Chris; | Call Number: 658.05 Dav i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Data structures: theory& practice 2nd ed. (second edition)
Author: Berztiess, A.T.; | Call Number: 005.73 Ber d | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Data structures: theory and practice 2nd ed. (second edition)
Author: Berztiss, A.T.; | Call Number: 005.73 Bar d | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Certified information security management (CISM Review Manual 2013)
Call Number: 658.478 Cer | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Certified information security management (Cism Review Manual 2015)
Call Number: 658.478 Cer | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information hiding techniques for steganography and digital watermarking/ Stefan Katzenbeisser
Call Number: 005.8 Inf | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Certified information security management (CISM Review Manual 2011)
Call Number: 658.478 Cer | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information security management handbook 4th ed./ editor Harold F. Tiptop
Call Number: 658.055 8 Inf | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information security risk analysis/Thomas R.
Author: Poltier, Thomas R.; | Call Number: 005.8 Pel i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Fundamentals of game design 2nd ed.
Author: Adams, Ernest; | Call Number: 794.8 Ada f | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   2 3 4 5 6 7 8 9 10 11  Next