Search Result Save to File Save as CSV
Your search for 43387 returns 6892 document(s)
Computer security
Author: Golddmann, Dieter; | Call Number: 005.8 Gol c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Security in computing
Author: Pfleeger, Charles P.; | Call Number: 005.8 Pfl s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Correlated failures, diversification, and information security risk management, page 397-422
Author: Pei-yu Chen, Gaurav Kataria, and Ramayya Krishnan | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
CWSP: Certified Wireless Security Profesional official study guide
Call Number: 005.807 6 Col c | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
CWSP: Certified Wireless Security Profesional official study guide
Call Number: 005.807 6 Cws | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Security monitoring
Author: Fry, Chris; | Call Number: 005.8 Fry s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Information management systems virtual storage: a practical guide for managers/ Myles E. Wals
Author: Walsh, Myles E.; | Call Number: 005.13 Wal i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Antecedent Factors of Information Security Behavior in Health Care Context: A Systematic Review
Author: Puspita Kencana Sari; | Call Number: TR-CSUI/ 001-2020 | Type: Technical Report
Find Similar |  Add To Favorites |  Detail in New Window 
Designing security architecture solution
Author: Ramachandran, Jay; | Call Number: 005.8 Ram d | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security : art and science
Author: Bishop, Matt; | Call Number: 005.8 Bis c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next