Your search for 46177 returns 6463 document(s) |
IT auditing : using controls to protect iformation assets 2nd ed |
Author: Davis, Chris; | Call Number: 658.05 Dav i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Interactive computer graphics: a top-down approach with openGL 4th ed. |
Author: Angel, Edward; | Call Number: 006.66 Ang i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Designing the user interface: strategies for effective human-computer interaction 4th ed. |
Author: Shneiderman, Ben; | Call Number: 004.6 Shn d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Interaction design: beyond human-computer interaction 4th ed. |
Author: Rogers, Yvonne; | Call Number: 004.019 Rog i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Network security essentials applications and standards 2nd ed. |
Author: Stallings, William; | Call Number: 005.8 Sta n | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Web security: a step-by step reference guide/Lincon D. Stein |
Author: Stein, Lincoln D.; | Call Number: 005.8 Ste w | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Internet & TCP/IP network security: securing protocols and applications/Uday I. Prabai, Vijay K. Garbani |
Author: Pabrai, Uday I.; | Call Number: 005.8 Pab i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Data communications, computer networks and open systems 4th ed/ Fred Halsall |
Author: Halsall, Fred; | Call Number: 004.6 Hal d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Introduction to health information privacy and security 2nd ed. |
Author: Rinehart-Thompson, Laurie A.; | Call Number: 610.68 Rin i | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Computer security handbook/editor Arthur, E. Hutt Seymour |
Call Number: R.658.478 02 Com | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|