Search Result Save to File Save as CSV
Your search for 43072 returns 712 document(s)
Cryptography and Network security principles and practice 5th ed. (INSTRUCTOR'S MANUAL)
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Instructor's Manual
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptography and Network security principles and practice 4th ed. (INSTRUCTOR'S MANUAL)
Author: Stallings, William; | Call Number: 005.8 Sta c | Type: Instructor's Manual
Find Similar |  Add To Favorites |  Detail in New Window 
Solaris: Sunshield basic security module guide solaris 2.5
Call Number: 005.43 Sol | Type: Buku Manual
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient Queue and GSI Security Management Framework for Mobile Desktop Grid,Hal. 84-88
Author: Muhammad Imran Sarwar, Mohamad Azam Osman; | Call Number: SEM-305 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
CWSP: Certified Wireless Security Profesional official study guide
Call Number: 005.807 6 Col c | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Proactive versus reactive security investments in the healthcare sector, page 451-471
Author: Juhee Kwon and M. Eric Johnson | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Quality competition and market segmentation in the security software market, page 589-606
Author: Debabrata Dey, Atanu Lahiri, and Guoying Zhang | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
A new patients' rights oriented model of EMR Access security
Author: YB Dwi setianto; yustina retno wahyu utami; | Call Number: sem-320 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Tecnology and security measures of sharing and applying supple chain information, 492-495
Author: Xiaaoli Wang; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Toward a Unified Model of Information Security Policy Compliance, Page 285-311
Author: Gregory D. Moody, Mikko Siponen, and Seppo Pahnila | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   13 14 15 16 17 18 19 20 21 22  Next