Your search for 43387 returns 6892 document(s) |
Information management/Donna S. Hussain |
Author: Hussain, Donna S.; | Call Number: 004.068 Hus i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A casebook for management information systems |
Author: Lucas, Henry C.; | Call Number: 658.403 8 Luc c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Meaningful Healthcare Security: Does Meaningful-Use Attestation Improve Information Security Performance?, Page 1043-1067 |
Author: Juhee Kwon and M. Eric Johnson | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Lotus notes and domino 4.5 architecture, adminstration, and security/Scott L. Thomas < Bradley |
Author: Thomas, Scott L.; | Call Number: 005.369 Tho l | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Perencanaan Infrastruktur Electronic Payment Security System Dalam Pengembangan B2B E-commece di Bank Mandiri |
Author: R.Gatot Prio Utomo; | Call Number: T-0225 (Softcopy T-0171) | Edition: 2001 | Type: Tesis
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Software configuration management coordination for team productivity/Wayne A. Babich |
Author: Babich, Wayne A.; | Call Number: 005 Bab s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
IPSec: the new security standard for the internet, intranets, and virtual private networks/Naganand Doraswarry; Dan Harkins |
Author: Doraswary, Naganand; | Call Number: 005.8 Dor i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Web security: a step-by step reference guide/Lincon D. Stein |
Author: Stein, Lincoln D.; | Call Number: 005.8 Ste w | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Tecnology and security measures of sharing and applying supple chain information, 492-495 |
Author: Xiaaoli Wang; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Toward a Unified Model of Information Security Policy Compliance, Page 285-311 |
Author: Gregory D. Moody, Mikko Siponen, and Seppo Pahnila | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|