Search Result Save to File Save as CSV
Your search for 43387 returns 6892 document(s)
Information management/Donna S. Hussain
Author: Hussain, Donna S.; | Call Number: 004.068 Hus i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
A casebook for management information systems
Author: Lucas, Henry C.; | Call Number: 658.403 8 Luc c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Meaningful Healthcare Security: Does Meaningful-Use Attestation Improve Information Security Performance?, Page 1043-1067
Author: Juhee Kwon and M. Eric Johnson | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Lotus notes and domino 4.5 architecture, adminstration, and security/Scott L. Thomas < Bradley
Author: Thomas, Scott L.; | Call Number: 005.369 Tho l | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Perencanaan Infrastruktur Electronic Payment Security System Dalam Pengembangan B2B E-commece di Bank Mandiri
Author: R.Gatot Prio Utomo; | Call Number: T-0225 (Softcopy T-0171) | Edition: 2001 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Software configuration management coordination for team productivity/Wayne A. Babich
Author: Babich, Wayne A.; | Call Number: 005 Bab s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
IPSec: the new security standard for the internet, intranets, and virtual private networks/Naganand Doraswarry; Dan Harkins
Author: Doraswary, Naganand; | Call Number: 005.8 Dor i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Web security: a step-by step reference guide/Lincon D. Stein
Author: Stein, Lincoln D.; | Call Number: 005.8 Ste w | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Tecnology and security measures of sharing and applying supple chain information, 492-495
Author: Xiaaoli Wang; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Toward a Unified Model of Information Security Policy Compliance, Page 285-311
Author: Gregory D. Moody, Mikko Siponen, and Seppo Pahnila | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   14 15 16 17 18 19 20 21 22 23  Next