Search Result
Save to File
Your search for
43072
returns
718
document(s)
Security Architecture Design, Development & Operations
Author: King, Christopher M.; | Call Number: 621.389 28 Kin s | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Dependency analysis of risks in information security
Author: S. Kondakci | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
ASP/MTS/ADSI web security
Author: Harrison, Richard; | Call Number: 005.86 Har a | Type: Softcopy Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Security issues in data warehouseing, HAL. 346-351
Author: Kunjal B. Joshi; | Call Number: SEM-291 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Information security tools & techniques, HAL. 1088-1096
Author: T.V. Prasad Viswanath Tangirola; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Network design security and management, HAL. 309-314
Author: V.B. Waghmare; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Solaris Shield basic security module
Call Number: 005.43 Sol | Type: Buku Manual
Find Similar
|
Add To Favorites
|
Detail in New Window
Principles of information security 5th ed.
Author: Whitman, Michael E.; | Call Number: 005.8 Whi p | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Management of information security 5th ed.
Author: Whitman, Michael E.; | Call Number: 005.8 Whi m | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Introduction to health information privacy and security
Author: Rinehart-Thompson, Laurie A.; | Call Number: 610.68 Rin i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
1
2
3
4
5
6
7
8
9
10
Next