Search Result
Save to File
Your search for
43072
returns
712
document(s)
Iformation security risk management planning: a case study at application module of state asset directorate general of state asset ministry of finance
Author: Sigit Prasetyo; Yudho Giri Sucahyo; | Call Number: sem-320 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Protection and security on the information superhighway
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
ITI security management/
Call Number: 658.403 8 Caz i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Security alert, page 104
Author: George K. Campbell | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Database security integrity
Author: Fernandez, Eduardo B.; | Call Number: 005.74 Fer d | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Security for computer systems
Author: Farr, M.A..L; | Call Number: 005.8 Far s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Iformation systems security
Author: Fisher, Royal P.; | Call Number: 658.478 Fis | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Protection and security on the information superhighway
Author: Cohen, Frederick B.; | Call Number: 005.8 Coh p | Type: Buku Pusat
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer and information security handbook
Author: Vacca, John R.; | Call Number: 005.8 Vac c | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Computer Security Journal
Call Number: 11 (1983): 1 | Type: Jurnal/ Majalah
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
1
2
3
4
5
6
7
8
9
10
Next