Search Result Save to File Save as CSV
Your search for 46177 returns 6463 document(s)
Database security/Silvano Castano
Call Number: 005.8 Dat | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer/ D.W. Davies
Author: Davies, Donald Watts; | Call Number: 384 Dav s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Managing risk in information systems
Author: Gibson, Darril; | Call Number: 005.8 Gib m | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
ISO 27001 complete self-assessment guide: practical tools for self-assessment
Call Number: 005.8 Iso | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
C how to program 4th ed.
Author: Deitel, H.M.; | Call Number: 005.133 Dei c | Type: Softcopy Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Big Java 4th ed.
Author: Horstmann, Cay S.; | Call Number: 005.133 Hor b | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Thinking in java 4th ed
Author: Eckel, Bruce; | Call Number: 005.133 Eck t | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
C++ how to program 4th ed.
Author: Deitel, H.M.; | Call Number: 005.133 Dei c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Computer security risk analysis and control a guide for the dp manager
Author: Wong, KK; | Call Number: 658.47 Won r | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Security Architecture Design, Development & Operations
Author: King, Christopher M.; | Call Number: 621.389 28 Kin s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   8 9 10 11 12 13 14 15 16 17  Next