Your search for 43387 returns 6892 document(s) |
Computer security |
Author: Golddmann, Dieter; | Call Number: 005.8 Gol c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security in computing |
Author: Pfleeger, Charles P.; | Call Number: 005.8 Pfl s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Correlated failures, diversification, and information security risk management, page 397-422 |
Author: Pei-yu Chen, Gaurav Kataria, and Ramayya Krishnan | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
CWSP: Certified Wireless Security Profesional official study guide |
Call Number: 005.807 6 Col c | Type: Softcopy Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
CWSP: Certified Wireless Security Profesional official study guide |
Call Number: 005.807 6 Cws | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security monitoring |
Author: Fry, Chris; | Call Number: 005.8 Fry s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information management systems virtual storage: a practical guide for managers/ Myles E. Wals |
Author: Walsh, Myles E.; | Call Number: 005.13 Wal i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Antecedent Factors of Information Security Behavior in Health Care Context: A Systematic Review |
Author: Puspita Kencana Sari; | Call Number: TR-CSUI/ 001-2020 | Type: Technical Report
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Designing security architecture solution |
Author: Ramachandran, Jay; | Call Number: 005.8 Ram d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer security : art and science |
Author: Bishop, Matt; | Call Number: 005.8 Bis c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|